Course

Basic Cryptography and Programming with Crypto API

University of Colorado System

In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.

Certificate Available ✔

Get Started / More Info
Basic Cryptography and Programming with Crypto API
More Computer Security and Networks Courses

Computer Communications

University of Colorado System

This specialization is developed for seniors and fresh graduate students to understand fundamental network architecture concepts and their impacts on cyber security,...

Introduction to Computer Information Systems

University of California, Irvine

This Specialization is intended for anyone seeking to learn basic computer skills. Through 3 courses, you will study computer hardware, software, and data safety....

Decryption with Python

Coursera Project Network

By the end of this project, you will be able to apply different decryption algorithms and techniques using Python. Moreover, you will apply cryptography concepts...

Play It Safe: Manage Security Risks

Google

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity...