Search result for History of ciphers Online Courses & Certifications
Get Course Alerts by Email
Introduction to Encryption and Cryptography
by Janina A- 0.0
2
Encryption and substitution ciphers The history of encryption Substitution ciphers The importance of complexity End of Week 1 Applications of Encryption...
Free
Cryptography from Scratch| Master Cryptography in Java
by Luke's Programming School- 3.8
2 hours on-demand video
In this Cryptography course we will start off with a little bit of history, then I cover the basics of Cryptography. Once you master Basics of cryptography, we can move on to modern cryptography, I explain what is Stream Cipher, and how Xor encryption works....
$14.99
Cryptography I
by Dan Boneh- 4.8
Approx. 23 hours to complete
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. History of Cryptography Stream Ciphers and Pseudo Random Generators Attacks on Stream Ciphers and The One Time Pad Real-World Stream Ciphers Stream Ciphers are Semantically Secure [optional] Block Ciphers More Attacks on Block Ciphers...
Cryptography: Boolean functions and related problems
by Kutsenko Aleksandr , Anastasiya Gorodilova , Natalia Tokareva , Stjepan Picek , George Pintus- 4.3
Approx. 5 hours to complete
The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks. The beginning of the Russian cryptography Boolean functions in cryptographic ciphers Introduction and history Algebraic normal form of a bent function...
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. This is a self-paced course that provides a continuation of network security topics. List and summarize the characteristics of good ciphers Describe the vulnerabilities of stream ciphers Summarize the history of SSL...
$166
Intel® Network Academy - Network Transformation 102
by Intel Network Academy- 4.6
Approx. 10 hours to complete
In this program, we will be covering the topic areas of software defined infrastructure (SDI) network functions virtualization (NFV), software-defined networking (SDN) and beyond. History Ciphers Under the Hood of SR-IOV on the Intel® Ethernet Controller XL710...
Java Programming: Arrays, Lists, and Structured Data
by Andrew D. Hilton , Robert Duvall , Owen Astrachan , Susan H. Rodger- 4.7
Approx. 14 hours to complete
At the end of the course you will write an encryption program and a program to break your encryption algorithm. Perform quantitative analyses of data (e. A Brief History of Cryptography End of Module Survey...