Cryptography
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.
Created by: University of Maryland, College Park-
Taught by: Jonathan Katz, Professor, University of Maryland, and Director, Maryland Cybersecurity Center
Maryland Cybersecurity Center
Each course is like an interactive textbook, featuri…

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.
Created by: University of Maryland, College Park-
Taught by: Jonathan Katz, Professor, University of Maryland, and Director, Maryland Cybersecurity Center
Maryland Cybersecurity Center
Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.
Help from your peersConnect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.
CertificatesEarn official recognition for your work, and share your success with friends, colleagues, and employers.
University of Maryland, College Park The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.Syllabus
WEEK 1
Week 1
Introduction to Classical Cryptography
10 videos, 5 readings expand
- Video: Course Overview
- Reading: Syllabus
- Reading: Programming Assignments
- Reading: About Me
- Reading: Week 1
- Video: Introduction
- Video: Introduction Continued
- Video: Hex and ASCII
- Video: Breaking the Vigenere Cipher
- Reading: Programming Assignment 1
- Video: Principles of Modern Cryptography
- Video: Perfect Secrecy
- Video: Perfect Secrecy Part II
- Video: The One-Time Pad
- Video: Implementing the One-Time Pad
Graded: Week 1 Quiz
WEEK 2
Week 2
Computational Secrecy and Principles of Modern Cryptography
7 videos, 2 readings expand
- Reading: Week 2
- Video: Limitations of the One-Time Pad
- Video: Computational Secrecy
- Video: Computational Secrecy Part II
- Video: Pseudorandomness
- Video: Pseudorandom Generators
- Video: The Pseudo One-Time Pad
- Reading: Programming Assignment 2
- Video: Proofs of Security
Graded: Week 2 Quiz
WEEK 3
Week 3
Private-Key Encryption
6 videos, 2 readings expand
- Reading: Week 3
- Video: Stronger Security Notions
- Video: Pseudorandom Functions and Block Ciphers
- Video: CPA-Secure Encryption from PRFs/Block Ciphers
- Video: Modes of Encryption
- Video: Security Against Chosen-Ciphertext Attacks
- Video: Padding-Oracle Attacks
- Reading: Programming Assignment 3
Graded: Week 3 Quiz
WEEK 4
Week 4
Message Authentication Codes
7 videos, 2 readings expand
- Reading: Week 4
- Video: Message Integrity
- Video: A Fixed-Length MAC
- Video: CBC-MAC
- Reading: Programming Assignment 4
- Video: Hash Functions
- Video: HMAC
- Video: Authenticated Encryption
- Video: Secure Communication Sessions
Graded: Week 4 Quiz
WEEK 5
Week 5
Number Theory
5 videos, 1 reading expand
- Reading: Week 5
- Video: Number Theory One
- Video: Number Theory Two
- Video: Number Theory Three
- Video: Number Theory Four
- Video: Number Theory Five
Graded: Week 5 Quiz
WEEK 6
Week 6
Key Exchange and Public-Key Encryption
6 videos, 1 reading expand
- Reading: Week 6
- Video: The Public-Key Revolution
- Video: Diffie-Hellman Key Exchange
- Video: The Public-Key Revolution Part II
- Video: Public-Key Encryption
- Video: Discrete-Log-Based Public-Key Encryption
- Video: RSA-Based Public-Key Encryption
Graded: Week 6 Quiz
WEEK 7
Week 7
Digital Signatures
7 videos, 2 readings expand
- Reading: Week 7
- Video: Digital Signatures
- Video: Digital Signatures Part II
- Video: RSA-Based Signatures
- Reading: Programming Assignment 5
- Video: Identification Schemes
- Video: Public-Key Infrastructure (PKI)
- Video: Putting It All Together: SSL/TLS
- Video: Parting Thoughts
Graded: Week 7 Quiz
Graded: Final Quiz
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
