課程信息
4.6
48 個評分
7 個審閱
專項課程

第 2 門課程(共 4 門),位於

100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為12 小時

建議:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....
可選語言

英語(English)

字幕:英語(English)...
專項課程

第 2 門課程(共 4 門),位於

100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為12 小時

建議:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....
可選語言

英語(English)

字幕:英語(English)...

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 3 小時

Integer Foundations

Building upon the foundation of cryptography, this module focuses on the mathematical foundation including the use of prime numbers, modular arithmetic, understanding multiplicative inverses, and extending the Euclidean Algorithm. After completing this module you will be able to understand some of the fundamental math requirement used in cryptographic algorithms. You will also have a working knowledge of some of their applications....
Reading
5 個視頻(共 60 分鐘), 10 個閱讀材料, 2 個測驗
Video5 個視頻
Divisibility, Primes, GCD14分鐘
Modular Arithmetic15分鐘
Multiplicative Inverses12分鐘
Extended Euclidean Algorithm13分鐘
Reading10 個閱讀材料
Course Introduction10分鐘
Lecture Slides - Divisibility, Primes, GCD10分鐘
Video - Adam Spencer: Why I fell in love with monster prime numbers15分鐘
L16: Additional Reference Material10分鐘
Lecture Slides - Modular Arithmetic10分鐘
L17: Additional Reference Material10分鐘
Lecture Slides - Multiplicative Inverses10分鐘
L18: Additional Reference Material10分鐘
Lecture Slides - Extended Euclidean Algorithm10分鐘
L19: Additional Reference Material10分鐘
Quiz2 個練習
Practice Assessment - Integer Foundation18分鐘
Graded Assessment - Integer Foundation16分鐘
2
完成時間(小時)
完成時間為 3 小時

Modular Exponentiation

A more in-depth understanding of modular exponentiation is crucial to understanding cryptographic mathematics. In this module, we will cover the square-and-multiply method, Eulier's Totient Theorem and Function, and demonstrate the use of discrete logarithms. After completing this module you will be able to understand some of the fundamental math requirement for cryptographic algorithms. You will also have a working knowledge of some of their applications....
Reading
4 個視頻(共 51 分鐘), 9 個閱讀材料, 2 個測驗
Video4 個視頻
Euler's Totient Theorem16分鐘
Eulers Totient Function12分鐘
Discrete Logarithms15分鐘
Reading9 個閱讀材料
Lecture Slides - Square-and-Multiply10分鐘
Video - Modular exponentiation made easy10分鐘
L20: Additional Reference Material10分鐘
Lecture Slide - Euler's Totient Theorem10分鐘
L21: Additional Reference Material10分鐘
Lecture Slide - Eulers Totient Function10分鐘
L22: Additional Reference Material10分鐘
Lecture Slide - Discrete Logarithms10分鐘
L23: Additional Reference Material10分鐘
Quiz2 個練習
Practice Assessment - Modular Exponentiation12分鐘
Graded Assessment - Modular Exponentiation20分鐘
3
完成時間(小時)
完成時間為 3 小時

Chinese Remainder Theorem

The modules builds upon the prior mathematical foundations to explore the conversion of integers and Chinese Remainder Theorem expression, as well as the capabilities and limitation of these expressions. After completing this module, you will be able to understand the concepts of Chinese Remainder Theorem and its usage in cryptography....
Reading
3 個視頻(共 25 分鐘), 5 個閱讀材料, 2 個測驗
Video3 個視頻
Moduli Restrictions, CRT-to-Integer Conversions10分鐘
CRT Capabilities and Limitations8分鐘
Reading5 個閱讀材料
Lecture Slide - CRT Concepts, Integer-to-CRT Conversions30分鐘
L24: Additional Reference Material10分鐘
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分鐘
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分鐘
Video - How they found the World's Biggest Prime Number - Numberphile12分鐘
Quiz2 個練習
Practice Assessment - Chinese Remainder Theorem12分鐘
Graded Assessment - Chinese Remainder Theorem20分鐘
4
完成時間(小時)
完成時間為 3 小時

Primality Testing

Finally we will close out this course with a module on Trial Division, Fermat Theorem, and the Miller-Rabin Algorithm. After completing this module, you will understand how to test for an equality or set of equalities that hold true for prime values, then check whether or not they hold for a number that we want to test for primality....
Reading
3 個視頻(共 36 分鐘), 8 個閱讀材料, 3 個測驗
Video3 個視頻
Fermat's Primality9分鐘
Miller-Rabin13分鐘
Reading8 個閱讀材料
Lecture Slide - Trial Division10分鐘
L27: Additional Reference Material10分鐘
Lecture Slide - Fermat's Primality10分鐘
L28: Additional Reference Material10分鐘
Lecture Slide - Miller-Rabin10分鐘
Video - James Lyne: Cryptography and the power of randomness10分鐘
L29: Additional Reference Material10分鐘
The Science of Encryption10分鐘
Quiz3 個練習
Practice Assessment - Primality Testing12分鐘
Graded Assessment - Primality Testing20分鐘
Course Project8分鐘

講師

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

關於 University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

關於 Introduction to Applied Cryptography 專項課程

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....
Introduction to Applied Cryptography

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心