» » Udacity Applied Cryptography

Information of news
  • Author: kityvn
  • Date: 26-09-2015, 17:44
26-09-2015, 17:44

Udacity Applied Cryptography

Category: Tutorials

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Why Take This Course?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

What Will I Learn?
Lesson 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken

Lesson 2: Symmetric Encryption
Sending messages when two people share a secret

Lesson 3: Key Exchange
Techniques to establish a shared secret

Lesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystems

Lesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce

Lesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash

Lesson 7: Secure Computation
Computing without exposing data

Udacity Applied Cryptography
Udacity Applied Cryptography
Udacity Applied Cryptography

I recommends Buy premimum account for High speed+parallel downloads!





Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

free html hit counter