- Level Professional
- Duration 13 hours
- Course by University of Colorado System
-
Offered by
About
Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes. This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.Modules
Instructor Introduction and Module Objectives
2
Videos
- Instructor Introduction
- Module Objectives
1
Readings
- Get help and meet other learners. Join your Community!
Alphabet
1
Videos
- Alphabet
Substitution Cipher
1
Assignment
- Caesar Cipher
1
Videos
- Substitution and Caesar Cipher
Modulo Operation
1
Assignment
- Modulo Operation and Caesar Cipher
1
Videos
- Modulo Operation
1
Readings
- Get help and meet other learners in this course. Join your discussion forums!
Monoalphabetic Cipher
1
Videos
- Monoalphabetic Cipher
Natural Language Redundancy
1
Videos
- Natural Language Redundancy
Polyalphabetic Cipher
1
Assignment
- Vigenere Cipher
1
Videos
- Polyalphabetic Cipher and Vigenere Cipher
1
Readings
- Lecture Slides for Classical Cipher - Substitution
Pseudo-Code: Vigenere Cipher
1
Peer Review
- Pseudo-Code: Vigenere Cipher
1
Readings
- About Pseudocode
Module Objectives
1
Videos
- Module Objectives
Rail Fence Cipher
1
Videos
- Rail Fence Cipher
Permutation Cipher
1
Assignment
- Rail Fence Cipher and Permutation Cipher
2
Videos
- Permutation Cipher
- Permutation Cipher Security
Product Cipher
1
Assignment
- Product Cipher
1
Videos
- Product Cipher
1
Readings
- Lecture Slides for Classical Cipher - Transposition
Modern Cipher and Module Objectives
1
Videos
- Modern Cipher and Module Objectives
Modern Cipher and Block Cipher (vs. Stream Cipher)
1
Videos
- Block Cipher vs. Stream Cipher
Ideal Block Cipher
1
Assignment
- Ideal Block Cipher
1
Videos
- Ideal Block Cipher
Feistel Cipher
1
Videos
- Feistel Cipher
Data Encryption Standard (DES)
1
Assignment
- DES
1
Peer Review
- DES Overview Pseudo-Code
4
Videos
- DES Overview
- DES Round Function
- DES Subkey Generation
- DES Security
2
Readings
- About Pseudocode
- Lecture Slides for Block Cipher and DES
Module Objectives
1
Videos
- Module Ojectives
Double-DES and Meet-in-the-Middle Attack
1
Videos
- Double-DES and Meet-in-the-Middle Attack
Triple DES
1
Assignment
- 3-DES and 4-DES
1
Videos
- Triple DES
Advanced Encryption Standard (AES)
1
Assignment
- AES
1
Videos
- Advanced Encryption Standard (AES)
2
Readings
- Lecture Slides for 3-DES and AES
- Symmetric Algorithm Survey
Module Objectives
1
Videos
- Module Objectives
Electronic Codebook (ECB) Mode
1
Videos
- Electronic Codebook (ECB)
Cipher Block Chaining (CBC) Mode
1
Videos
- Cipher Block Chaining (CBC)
Cipher Feedback (CFB) Mode
1
Videos
- Cipher Feedback (CFB)
Output Feedback (OFB) Mode
1
Videos
- Output Feedback (OFB)
Counter (CTR) Mode
1
Videos
- Counter (CTR)
Block Cipher Operation Modes
1
Assignment
- Block Cipher Operation Modes
1
Readings
- Lecture Slides for Block Cipher Operation Modes
Real-World Use of Block Cipher Operation Mode
1
Peer Review
- Real-world use of block cipher operation mode
Auto Summary
Dive into the world of Symmetric Cryptography, an essential course in the IT & Computer Science domain, offered by Coursera. Designed for professionals, this course unravels the intricacies of symmetric cryptography, emphasizing the importance of a shared secret key in safeguarding message confidentiality against unauthorized access. Throughout this comprehensive 780-minute course, learners will explore foundational techniques such as substitution and transposition that underpin classical cryptography. Progressing to modern applications, the course delves into product ciphers and critically acclaimed block ciphers, including DES, 3-DES, and AES. Additionally, it covers various modes of block cipher operations, such as ECB, CBC, CFB, OFB, and CTR, to handle variable data lengths effectively. Symmetric Cryptography is a key component of two specializations: Applied Cryptography and Introduction to Applied Cryptography, making it a valuable learning path for those looking to deepen their expertise in the field. With a Starter subscription plan, this professional-level course is tailored for individuals eager to enhance their cryptographic skills and apply them in real-world scenarios.

Sang-Yoon Chang