1

Introduction to Cryptography and Data Security (Ruhr University Bochum). Instructor: Professor Christof Paar.

FREE
This course includes
Hours of videos

666 years, 7 months

Units & Quizzes

24

Unlimited Lifetime access
Access on mobile app
Certificate of Completion

This is a series of lectures on cryptography that was taught in the 2010/2011 academic year at Ruhr University Bochum. The lectures give a fairly comprehensive introduction to modern applied cryptography. Topics include: Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA Cryptosystem, Diffie-Hellman Key Exchange, Elliptic Curve Cryptography (ECC), Digital Signatures, and the SHA hash function family.

Course Currilcum

  • Lecture 01 – Introduction to Cryptography Unlimited
  • Lecture 02 – Modular Arithmetic and Historical Ciphers Unlimited
  • Lecture 03 – Stream Ciphers, Random Numbers and One Time Pad Unlimited
  • Lecture 04 – Stream Ciphers and Linear Feedback Shift Registers Unlimited
  • Lecture 05 – Data Encryption Standard (DES): Encryption Unlimited
  • Lecture 06 – Data Encryption Standard (DES): Key Schedule and Decryption Unlimited
  • Lecture 07 – Introduction to Galois Fields for the AES Unlimited
  • Lecture 08 – Advanced Encryption Standard (AES) Unlimited
  • Lecture 09 – Modes of Operation for Block Ciphers Unlimited
  • Lecture 10 – Multiple Encryption and Brute-Force Attacks Unlimited
  • Lecture 11 – Number Theory for PKC: Euclidean Algorithm, Euler’s Phi Function & Euler’s Theorem Unlimited
  • Lecture 12 – The RSA Cryptosystem and Efficient Exponentiation Unlimited
  • Lecture 13 – Diffie-Hellman Key Exchange and the Discrete Log Problem Unlimited
  • Lecture 14 – The Generalized Discrete Log Problem and the Security of Diffie-Hellman Unlimited
  • Lecture 15 – Elgamal Encryption Scheme Unlimited
  • Lecture 16 – Introduction to Elliptic Curves Unlimited
  • Lecture 17 – Elliptic Curve Cryptography (ECC) Unlimited
  • Lecture 18 – Digital Signatures and Security Services Unlimited
  • Lecture 19 – Elgamal Digital Signature Unlimited
  • Lecture 20 – Hash Functions Unlimited
  • Lecture 21 – SHA-1 Hash Function Unlimited
  • Lecture 22 – MAC (Message Authentication Codes) and HMAC Unlimited
  • Lecture 23 – Symmetric Key Establishment and Kerberos Unlimited
  • Lecture 24 – Man-in-the-middle Attack, Certificates and PKI Unlimited