Engineering and Technology
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
The course Applied Cryptography on Udacity covers a range of topics related to encryption and secure communication. It begins by exploring perfect ciphers and what makes them secure. The course then delves into the breaking of the Lorenz Cipher, a historical example of encryption being compromised. Next, the focus shifts to symmetric encryption, which involves sending messages when two people share a secret. Key exchange techniques are then discussed, providing methods for establishing a shared secret. Asymmetric encryption is introduced as a means of exchanging information using public key cryptosystems. Public key protocols, such as encrypted key exchange, certificates, and secure commerce, are also covered. The course concludes by examining how cryptographic primitives can be utilized for anonymizing communication, voting, and digital cash. Additionally, secure computation is explored, which allows for computing without exposing sensitive data.
by Udacity
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Lea...
by Udacity
Take advantage of the growing need for skilled security professionals by mastering the sought-after...
by Udacity
Learn how the attention mechanism works and can be applied to machine translation.
by Udacity
Learn how to perform asynchronous requests as you build a web app with data from Google Street View,...