CG数据库 >> Udacity – Applied Cryptography

Udacity – Applied Cryptography的图片1

Udacity - Applied Cryptography

English | mp4 | H264 852x480 | AAC 2 ch | Sub (.srt): English | 4.36 GB

eLearning | Level: Advanced

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Why Take This Course?

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

Udacity – Applied Cryptography的图片2

What Will I Learn?

Syllabus

Lesson 1: Perfect Ciphers

What makes certain ciphers perfect, how the Lorenz Cipher was broken

Lesson 2: Symmetric Encryption

Sending messages when two people share a secret

Lesson 3: Key Exchange

Techniques to establish a shared secret

Lesson 4: Asymmetric Encryption

Exchanging information using public key cryptosystems

Lesson 5: Public Key Protocols

Encrypted key exchange, certificates, secure commerce

Lesson 6: Using Cryptographic Primitives

How cryptography can be useful for anonymizing communication, voting, and digital cash

Lesson 7: Secure Computation

Computing without exposing data

Udacity – Applied Cryptography的图片3

发布日期: 2015-05-03