Birla Institute of Technology & Science, Pilani

Cryptography

Birla Institute of Technology & Science, Pilani

Cryptography

Rajesh Kumar

位教师:Rajesh Kumar

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

7 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

7 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Understand various cryptographic and network security services and mechanisms

  • Apply various cryptographic techniques and system-level network security applications

  • Analyse various cryptographic techniques and system-level network security applications

  • Evaluate the cryptographic algorithms, hash algorithms and network application security schemes

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

103 项作业

授课语言:英语(English)
最近已更新!

February 2026

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有12个模块

In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.

涵盖的内容

3个视频1篇阅读材料1个讨论话题

Cryptographic principles are the fundamental concepts and techniques that are used in the field of cryptography to secure communication and protect data. These principles include confidentiality, integrity, authentication, non-repudiation, and key management. Students will grasp how cryptography protects our digital world. We will start with its purpose — turning sensitive data into unreadable formats to keep it safe. Then, we will break down the key principles: confidentiality, integrity, and authentication. We will uncover the essential security services — like access control and non-repudiation. You will learn what they do and why they are crucial for any secure system. We will also explore the mechanisms that make it all work: encryption, hashing, and more.

涵盖的内容

10个视频10篇阅读材料10个作业1个讨论话题

This module introduces students to the foundational techniques of classical cryptography, focusing on how information is transformed to ensure secure communication. Learners will begin by understanding the basic concepts of plain text (readable data) and cipher text (encrypted data), establishing the groundwork for how cryptographic systems operate. The module then explores substitution techniques, where symbols in the plaintext are replaced with other symbols to obscure meaning. Examples such as the Caesar cipher, monoalphabetic cipher, and Vigenère cipher will be studied to illustrate how substitution alters data while maintaining structure. Next, students will examine transposition techniques, which rearrange the positions of characters without changing the symbols themselves. Methods like the Rail Fence cipher and Columnar transposition will demonstrate how order manipulation enhances security.

涵盖的内容

13个视频13篇阅读材料14个作业1个讨论话题

This module introduces symmetric key cryptography and its role in securing data. Learners will explore commonly used symmetric encryption algorithms such as AES, DES, 3DES, and Blowfish, and examine block cipher modes of operation including ECB, CBC, CFB, OFB, and CTR. The module also focuses on the practical application of encryption and decryption using different modes, along with an analysis of security vulnerabilities, key management challenges, and real-world use cases of symmetric cryptographic systems.

涵盖的内容

5个视频5篇阅读材料5个作业1个讨论话题

This module introduces symmetric key cryptography and the concept of shared secret keys. Learners will study classical encryption algorithms such as DES, Double DES, and Triple DES, and explore symmetric key encryption algorithms including IDEA, RC5, and modern standards such as AES and Blowfish. The module also compares block ciphers and stream ciphers through practical examples, and analyses the strengths, limitations, and real-world applications of symmetric encryption algorithms in secure systems.

涵盖的内容

6个视频6篇阅读材料7个作业1个讨论话题

Asymmetric Key Cryptography, also known as Public Key Cryptography, is a cryptographic system that uses a pair of mathematically related keys — a public key for encryption and a private key for decryption. This module explores the underlying mathematical concepts, key generation, encryption and decryption processes, digital signatures, and the role of asymmetric cryptography in securing modern communication systems such as SSL/TLS and email encryption.

涵盖的内容

10个视频4篇阅读材料11个作业1个讨论话题

The Asymmetric Key Cryptography Algorithms module focuses on the study and implementation of major public key algorithms used to secure data and communications. It covers key algorithms such as RSA, Diffie-Hellman, ElGamal, and Elliptic Curve Cryptography (ECC), exploring their mathematical foundations, key generation processes, encryption and decryption mechanisms, and real-world applications in digital security. The module also examines the strengths, weaknesses, and performance considerations of each algorithm in various cryptographic contexts.

涵盖的内容

10个视频3篇阅读材料11个作业1个讨论话题

The Public Key Infrastructure (PKI) module provides an in-depth understanding of the framework that enables secure electronic communication through the management of public-key encryption and digital certificates. This module explores the core components of PKI, including Certificate Authorities (CAs), Registration Authorities (RAs), digital certificates, certificate revocation, and trust models. It also discusses how PKI supports secure email, web authentication (SSL/TLS), code signing, and identity verification in modern networked environments.

涵盖的内容

12个视频4篇阅读材料12个作业1个讨论话题

This module introduces authentication and its role in securing digital systems. Learners will study password-based authentication methods and their limitations, and explore biometric techniques such as fingerprint, facial recognition, and iris-based authentication. The module also examines two-factor and multi-factor authentication, token-based approaches, single sign-on, certificate-based authentication, and Kerberos. Finally, learners will analyse the strengths, weaknesses, vulnerabilities, and real-world applications of different authentication techniques.

涵盖的内容

12个视频12篇阅读材料14个作业1个讨论话题

This module introduces the fundamentals of Internet security and cryptography. Learners will examine common Internet security protocols, including HTTPS, SSL/TLS, IPsec, SSH, SFTP, Kerberos, and OAuth 2.0/OpenID Connect. The module further explores advanced topics such as email security using PGP and S/MIME, core elements of web security, common web security threats, best practices, and emerging trends. Additionally, learners will study network security mechanisms including firewalls, intrusion detection and prevention systems (IDS/IPS), and virtual private networks (VPNs), and evaluate their role in securing modern Internet-based systems.

涵盖的内容

9个视频9篇阅读材料9个作业1个讨论话题

This module introduces modern cryptography and focuses on advanced cryptographic techniques designed to enable privacy, security, and trust in contemporary digital systems. Learners will explore secure multi-party computation, zero-knowledge proofs, fully homomorphic encryption, and oblivious RAM, along with functional encryption and private information retrieval. The module also examines symmetric searchable encryption and leakage-resilient cryptography, and concludes with applications of modern cryptography in secure voting and secure election systems.

涵盖的内容

8个视频8篇阅读材料9个作业1个讨论话题

End-Term Examination

涵盖的内容

1个作业

位教师

Rajesh Kumar
Birla Institute of Technology & Science, Pilani
3 门课程444 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'