Cryptography and Information Theory (Coursera)

Cryptography and Information Theory (Coursera)

Añade tu reseña
Añadir a Mis FavoritosAñadido a tus favoritosEliminado de tus favoritos 0
Añadir para comparar

Descripción de “Cryptography and Information Theory (Coursera)”

This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff’s Principle.

It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.

Course 1 of 4 in the Applied Cryptography Specialization

Syllabus

WEEK 1

Cryptography Overview

This module defines the technical terms in cryptography and introduce Alice, Bob, and Eve. To study the attacker Eve’s perspective, we will describe Kerckhoff’s Principle (“the attacker knows the system”), which defines the scope of the attacker knowledge (what is secret vs. what the attacker can know). We will also describe Security by Obscurity, which contrasts Kerckhoff’s Principle.

Graded: Alice-Bob-Eve Framework

Graded: Kerckhoff’s Principle and Security by Obscurity

WEEK 2

Information Entropy

This module studies information entropy to quantify randomness. Information entropy can be used to measure the strength of the key or the secret information that determines the security of a cryptosystem against an attacker who does not know the random key.

Graded: Entropy: Balls in a Bin

WEEK 3

Brute-Force Attack and Cryptanalysis

This module studies the attacker view whose objective is to learn the key and break the cryptographic protection using the key. First, we will define brute force attack and describe how to quantify the attacker effort for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly, we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory.

Graded: Brute-Force Attack, Cryptanalysis, and One-Time Pad

WEEK 4

Computational Security and Side-Channel Attack

This module studies cryptography from the practical point of view. We will first define computational security, which relies on the fact that real world attackers are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey side channel attacks and unintentional information leakage from the physical implementations of cryptosystems.

Especificaciones: Cryptography and Information Theory (Coursera)

Curso ofrecido por
Disponibilidad

✔ Disponible

Plataforma

Universidad

Impartido por

Sang-Yoon Chang

País

USA

Nivel, duración y fechas
Nivel

Intermedio

Fecha

04/05/2020

Duración

4 semanas

Tiempo necesario

2-4 horas/semana

Idioma del curso
Idioma vehicular

Inglés

Subtítulos

No informado

Exámenes y Certificados
Certificados

Certificado de Pago

Exámenes/Proyectos

Con Examen/Proyecto Final de pago

User Reviews

0.0 fuera de 5
0
0
0
0
0
Write a review

Aún no hay reseñas.

Se el primero en opinar sobre “Cryptography and Information Theory (Coursera)”

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Antes de enviar tu opinión, has de aceptar nuestra política de cookies y privacidad

Cryptography and Information Theory (Coursera)
Cryptography and Information Theory (Coursera)

Este sitio web utiliza cookies para un correcto funcionamiento. Si continúas navegando estás dando tu consentimiento para estas cookies y aceptas nuestra política de cookies, clic para más información.

ACEPTAR
Aviso de cookies
Comparar artículos
  • Total (0)
Comparar
0