密码学

Cryptography

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. Part of the 网络安全 Specialization »

马里兰大学帕克分校

分享

密码学

课程概述

Historically, cryptography was used to ensure private communication between two people with some prior relationship. More recently, its scope has expanded to include things as diverse as data integrity, secure internet-wide communication, electronic cash, secure distributed computation, and more.

Cryptography has also become ubiquitous. Perhaps unknowingly, we have all encountered applications of cryptography in our daily lives—whether by logging in using a password, making a web purchase over a secure connection, or applying a software update that is digitally signed.

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. We will learn the importance of carefully defining security; of relying on a set of well-studied “hardness assumptions” (e.g., the hardness of factoring large numbers); and of the possibility of proving security of complicated constructions based on low-level primitives. We will not only cover these ideas in theory, but will also explore their real-world impact. You will learn about cryptographic primitives in wide use today, and see how these can be combined to develop modern protocols for secure communication.

授课大纲

Introduction and Motivation
Classical Encryption Schemes
Principles of Modern Cryptography

Perfect Secrecy and Its Limitations
Private-Key Encryption
Computational Security
Pseudorandom Generators and Stream Ciphers
Pseudorandom Functions and Block Ciphers
Modes of Encryption
Security against Chosen-Ciphertext Attacks and Padding-Oracle Attacks

Message Authentication
Secrecy vs. Integrity
Message Authentication Codes
CBC-MAC
Authenticated Encryption

Hash Functions
Security Requirements
HMAC
Additional Applications of Hash Functions

Number Theory and Mathematical Background
The Public-Key Revolution
Key Distribution and Key Management
Diffie-Hellman Key Exchange

Public-Key Encryption
Definitions of Security
Hybrid Encryption and the KEM/DEM Paradigm
El Gamal Encryption and DHIES
RSA Encryption and the RSA PKCS #1 Standard

Digital Signatures
Signatures vs. MACs
RSA-Based Signatures and the RSA PKCS #1 Standard
DSA/ECDSA
Public-Key Infrastructures

先修知识

Intended for students majoring in either computer science or mathematics.

A prior course covering discrete mathematics and basic probability.

Prior exposure to algorithms will be helpful, but the necessary background can be picked up quickly.

Some of the examples and optional exercises will assume familiarity with programming in a C-like language, and some advanced topics will require mathematical maturity.
This course only offers a Verified Certificate. It will not offer the Statement of Accomplishment. You can start verifying your work for free and pay anytime before the final week of the course. Coursera Financial Aid is also available for learners with limited economic means.

If you complete the course without verifying your work, you will still earn a completion grade on your Course Records page.

声明:MOOC中国收录之课程均源自下列机构,版权均归他们所有。本站仅作报道并尊重其著作权益,感谢他们对MOOC事业做出的贡献!(排名不分先后)
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc

Copyright © 2008-2015 MOOC.CN 慕课改变你,你改变世界