- Level Professional
- المدة 8 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses. This course is a part of the Applied Cryptography specialization.الوحدات
Instructor Introduction and Module Objectives
2
Videos
- Instructor Introduction
- Module Objectives
1
Readings
- Get help and meet other learners in this course. Join your discussion forums!
Cryptography Basics
1
Peer Review
- Alice-Bob-Eve Framework
2
Videos
- Alice, Bob, and Eve
- Cryptography Terminology
Kerckhoff's Principle: Attacker Knows the System
2
Videos
- Threat Model and the Attacker Knowledge
- Kerckhoff's Principle
Security by Obscurity
1
Assignment
- Kerckhoff's Principle and Security by Obscurity
1
Discussions
- Kerckhoff's Principle vs. Security by Obscurity
2
Videos
- Security by Obscurity and Steganography, Part 1
- Security by Obscurity and Steganography, Part 2
1
Readings
- Slides for Cryptography Overview
Module Objectives
1
Videos
- Module Objectives
Random vs. Deterministic
1
Videos
- Deterministic vs. Random
Information Entropy
2
Assignment
- Throwing a Dice
- Entropy: Balls in a Bin
1
Discussions
- Entropy Experience
4
Videos
- Information Entropy
- Entropy: Uniform Distribution Case
- Entropy: General Distribution Case
- Entropy Recap
1
Readings
- Slides for Information Entropy
Module Objectives
1
Videos
- Module Objectives
Brute-Force Attack
1
Videos
- Brute Force Attack
Cryptanalysis
1
Videos
- Cryptanalysis
Perfect Secrecy
1
Assignment
- Brute-Force Attack, Cryptanalysis, and One-Time Pad
1
Videos
- Perfect Secrecy and One-Time Pad
1
Readings
- Lecture Slides for Brute Force and Cryptanalysis
Module Objectives
1
Videos
- Module Objectives
Computational Security
1
Videos
- Computational Security: Attacker's Computational Bound
Side-Channel Attack
1
Discussions
- Side-channel attack examples
1
Videos
- Side-Channel Attack
2
Readings
- Lecture Slides for Computational Security and Side Channel Attacks
- Reading on physical side-channel attacks
Auto Summary
Enhance your IT and Computer Science skills with "Cryptography and Information Theory," led by Coursera. Dive into cryptographic techniques and information theory, exploring concepts like entropy, Kerckhoff's Principle, and various security analyses. This professional-level course, lasting 480 minutes, is part of the Applied Cryptography specialization. Available through Starter and Professional subscriptions, it's ideal for those seeking advanced understanding in cryptographic algorithms and information security.

Sang-Yoon Chang