- Level Professional
- Duration 17 hours
- Course by University of Colorado System
-
Offered by
About
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.Modules
Course Overview
1
Videos
- Course Overview
1
Readings
- Get help and meet other learners. Join your Community!
Introduction to Basic Cryptography
1
Videos
- Basic Cryptography
1
Readings
- Introduction to cryptology, from PGP Corporation
Kerckhoff's Principle - Protect with Key Size
1
Videos
- Kerckhoff's Principle
1
Readings
- What makes a cryptographic protocol strong?
CryptoAnalysis of Monoalphabetic Substitution Cipher
1
Videos
- CryptoAnalysis of Monoalphabetic Substitution Cipher
1
Readings
- Basic Cryptoanalysis. Three Basic Variations of Cryptoanalysis or Cipher Attack:
Columnar Transposition Ciphers
1
Videos
- Columnar Transposition Ciphers
1
Readings
- Columnar transposition Ciphers
One Time Pad & Quantum Distribution Keys
1
Assignment
- Exam 2.1
1
Discussions
- Discussion Topic
1
Videos
- One-Time Pad & Quantum Key Distribution
1
Readings
- One time pad encryption
Symmetric Key Encryption and DES
1
Videos
- Symmetric Key Algorithm
1
Readings
- Symmetric Key Encryption and DES
Advanced Encryption Standard (AES)
1
Videos
- Advanced Encryption Standard
1
Readings
- AES: The Advanced Encryption Standard by Avi Kak
AES Key Expansion/Schedule
1
Videos
- AES Expansion/Schedule
1
Readings
- Section 8.8 Key Expansion Algorithm from Prof. Section 8.8 Key Expansion Algorithm Lecture Note
AES Selection Criteria
1
Videos
- AES Selection Criteria
1
Readings
- Report on the Development of the Advanced Encryption Standard (AES)
Dealing with Block Swapping and Replay Attacks
1
Videos
- Dealing with Block Swapping and Replay Attacks
Block Cipher Mode of Operation
1
Assignment
- Exam 2.2. Symmetric Key Algorithm
1
Peer Review
- Project 2a. Using OpenSSL to encrypt/decrypt data
1
Videos
- Block Cipher Mode of Operation
1
Readings
- Block cipher mode of operation
Diffie-Hellman Symmetric Key Exchange Protocol
1
Peer Review
- Project 2b. Decipher the message encrypted with shared key established by the Diffie-Hellman Key Exchange Protocol
1
Videos
- Diffie-Hellman Symmetric Key Exchange Protocol
1
Readings
- Diffie-Hellman Key Exchange Protocol
Modular Arithmetic
1
Videos
- Modular Arithmetic
1
Readings
- Modular Arithemetic
Euler Totient Theorem
1
Videos
- Euler Totient Theorem
1
Readings
- Euler's Totient Theorem
RSA Asymmetric Crypto Algorithm
1
Videos
- RSA Asymmetric Crypto Algorithm
1
Readings
- RSA Cryptosystem
Understanding RSA with OpenSSL
1
Assignment
- Exam 2.3. Asymmetric Key Cryptography
1
Videos
- Understanding RSA with OpenSSL
1
Readings
- OpenSSL Command-Line HOWTO
Use Crypto API to Encrypt and Decrypt
1
Videos
- Use Crypto API to Encrypt and Decrypt
1
Readings
- PHP encrypt and decrypt crypto api
Use Crypto API to Sign and Verify
1
Videos
- Use Crypto API to Sign and Verify
1
Readings
- PHP Openssl sign and verify API
Mini Capstone: Enhance Registration Web Site Security
1
Assignment
- Exam 2.4. Develop Secure Programs with Crypto API
1
Videos
- Mini Capstone: Enhance Registration Web Site Security
1
Readings
- Ashley Madison Case
Auto Summary
Explore the fundamentals of cryptography and programming with the Crypto API in this professional IT & Computer Science course by Coursera. Learn encryption techniques, symmetric key cryptography, RSA algorithm, and secure PHP programming over 1020 minutes. Ideal for IT professionals, with Starter and Professional subscription options.

Edward Chow