Warning: WP Redis: Connection refused in /www/wwwroot/cmooc.com/wp-content/plugins/powered-cache/includes/dropins/redis-object-cache.php on line 1433
密码学 | MOOC中国 - 慕课改变你,你改变世界

密码学

Cryptography

2724 次查看
马里兰大学帕克分校
Coursera
  • 完成时间大约为 18 个小时
  • 混合难度
  • 英语
注:本课程由Coursera和Linkshare共同提供,因开课平台的各种因素变化,以上开课日期仅供参考

你将学到什么

Number Theory

Cryptography

Public-Key Cryptography

课程概况

Historically, cryptography was used to ensure private communication between two people with some prior relationship. More recently, its scope has expanded to include things as diverse as data integrity, secure internet-wide communication, electronic cash, secure distributed computation, and more.

Cryptography has also become ubiquitous. Perhaps unknowingly, we have all encountered applications of cryptography in our daily lives—whether by logging in using a password, making a web purchase over a secure connection, or applying a software update that is digitally signed.

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. We will learn the importance of carefully defining security; of relying on a set of well-studied “hardness assumptions” (e.g., the hardness of factoring large numbers); and of the possibility of proving security of complicated constructions based on low-level primitives. We will not only cover these ideas in theory, but will also explore their real-world impact. You will learn about cryptographic primitives in wide use today, and see how these can be combined to develop modern protocols for secure communication.

课程大纲

Introduction and Motivation
Classical Encryption Schemes
Principles of Modern Cryptography

Perfect Secrecy and Its Limitations
Private-Key Encryption
Computational Security
Pseudorandom Generators and Stream Ciphers
Pseudorandom Functions and Block Ciphers
Modes of Encryption
Security against Chosen-Ciphertext Attacks and Padding-Oracle Attacks

Message Authentication
Secrecy vs. Integrity
Message Authentication Codes
CBC-MAC
Authenticated Encryption

Hash Functions
Security Requirements
HMAC
Additional Applications of Hash Functions

Number Theory and Mathematical Background
The Public-Key Revolution
Key Distribution and Key Management
Diffie-Hellman Key Exchange

Public-Key Encryption
Definitions of Security
Hybrid Encryption and the KEM/DEM Paradigm
El Gamal Encryption and DHIES
RSA Encryption and the RSA PKCS #1 Standard

Digital Signatures
Signatures vs. MACs
RSA-Based Signatures and the RSA PKCS #1 Standard
DSA/ECDSA
Public-Key Infrastructures

预备知识

Intended for students majoring in either computer science or mathematics.

A prior course covering discrete mathematics and basic probability.

Prior exposure to algorithms will be helpful, but the necessary background can be picked up quickly.

Some of the examples and optional exercises will assume familiarity with programming in a C-like language, and some advanced topics will require mathematical maturity.
This course only offers a Verified Certificate. It will not offer the Statement of Accomplishment. You can start verifying your work for free and pay anytime before the final week of the course. Coursera Financial Aid is also available for learners with limited economic means.

If you complete the course without verifying your work, you will still earn a completion grade on your Course Records page.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2022 CMOOC.COM 慕课改变你,你改变世界