1
Introduction to Cryptography and Data Security (Ruhr University Bochum). Instructor: Professor Christof Paar.
FREE
This course includes
Hours of videos
666 years, 7 months
Units & Quizzes
24
Unlimited Lifetime access
Access on mobile app
Certificate of Completion
This is a series of lectures on cryptography that was taught in the 2010/2011 academic year at Ruhr University Bochum. The lectures give a fairly comprehensive introduction to modern applied cryptography. Topics include: Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA Cryptosystem, Diffie-Hellman Key Exchange, Elliptic Curve Cryptography (ECC), Digital Signatures, and the SHA hash function family.
Course Currilcum
- Lecture 01 – Introduction to Cryptography Unlimited
- Lecture 02 – Modular Arithmetic and Historical Ciphers Unlimited
- Lecture 03 – Stream Ciphers, Random Numbers and One Time Pad Unlimited
- Lecture 04 – Stream Ciphers and Linear Feedback Shift Registers Unlimited
- Lecture 05 – Data Encryption Standard (DES): Encryption Unlimited
- Lecture 06 – Data Encryption Standard (DES): Key Schedule and Decryption Unlimited
- Lecture 07 – Introduction to Galois Fields for the AES Unlimited
- Lecture 08 – Advanced Encryption Standard (AES) Unlimited
- Lecture 09 – Modes of Operation for Block Ciphers Unlimited
- Lecture 10 – Multiple Encryption and Brute-Force Attacks Unlimited
- Lecture 11 – Number Theory for PKC: Euclidean Algorithm, Euler’s Phi Function & Euler’s Theorem Unlimited
- Lecture 12 – The RSA Cryptosystem and Efficient Exponentiation Unlimited
- Lecture 13 – Diffie-Hellman Key Exchange and the Discrete Log Problem Unlimited
- Lecture 14 – The Generalized Discrete Log Problem and the Security of Diffie-Hellman Unlimited
- Lecture 15 – Elgamal Encryption Scheme Unlimited
- Lecture 16 – Introduction to Elliptic Curves Unlimited
- Lecture 17 – Elliptic Curve Cryptography (ECC) Unlimited
- Lecture 18 – Digital Signatures and Security Services Unlimited
- Lecture 19 – Elgamal Digital Signature Unlimited
- Lecture 20 – Hash Functions Unlimited
- Lecture 21 – SHA-1 Hash Function Unlimited
- Lecture 22 – MAC (Message Authentication Codes) and HMAC Unlimited
- Lecture 23 – Symmetric Key Establishment and Kerberos Unlimited
- Lecture 24 – Man-in-the-middle Attack, Certificates and PKI Unlimited