# Learn Cryptography Course

Welcome to Learn Cryptography's Online training with live Instructor using an interactive cloud desktop environment DaDesktop.

Experience remote live training using an interactive, remote desktop led by a human being!

## Cryptography Overview

#### What is Cryptography?

**Cryptography** is the study of information hiding and verification. It includes the protocols, algorithms and strategies to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication.

Cryptography is derived from the Greek words: kryptós, "hidden", and gráphein, "to write" - or "hidden writing". People who study and develop cryptography are called **cryptographers**. The study of how to *circumvent* the use of cryptography for unintended recipients is called **cryptanalysis**, or codebreaking. Cryptography and cryptanalysis are sometimes grouped together under the **umbrella** term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science. At the dawn of the 21 century in an ever more interconnected and technological world cryptography started to be ubiquitous as well as the reliance on the benefits it brings, especially the increased security and verifiability.

#### Content

**Part I: Introducing Cryptography**

- History of Cryptography
- Classical Cryptography
- Contemporary Cryptography
- Cryptography in Popular Culture
- Timeline of Notable Events

- Fundamental Concepts
- Goals of Cryptography
- Goals of Cryptanalysis
- Role of Cryptography in Computer Security
- Symmetric Key Ciphers
- Asymmetric Key Ciphers
- Random Number Generation
- Hashes
- Key Distribution and Authentication (key management and the web of trust)
- Common flaws and weaknesses
- Secure Passwords
- S-box

**Part II: Designing Cryptosystems**

- The Basic Principles
- Little Secrets Hide Bigger Secrets
- Open Algorithms and the Value of Peer-Review
- Think Like a Cryptanalyst
- Cryptography/Error Correction Systems
- Mathematical Background
- Computer Security is More Than Encryption
- Unbroken is Not Necessarily Unbreakable

**Part III: Cryptanalysis**

- The Basic Principles
- Weaknesses
- Proportionality of Secrecy
- Length of the key
- Quality of Random Source
- Plaintext effect on Ciphertext

- Statistical Leaking
- Faulty Implementation
- Inadequate Peer-Review
- Social Engineering and Coercion
- Leakage and Side Channels

- Proportionality of Secrecy
- Attacks
- Brute-Force Attack
- Dictionary Attack

- Frequency Analysis
- Index of Coincidence
- Linear Cryptanalysis
- Differential Cryptanalysis
- Meet in the Middle Attack
- Man-in-the-middle attack

- Brute-Force Attack
- Breaking Hash Algorithms
- Collisions
- Generating
- Exploiting

- Birthday Attack
- Joux Attack
- Time Memory Trade Off (rainbow tables)

- Collisions
- How Historical Systems Were Broken
- Transposition Ciphers
- Caesar Cipher
- Enigma Machine
- Permutation Cipher
- Vigenère Cipher

**Part IV: Using Cryptosystems**

- Applying Cryptography
- Digital Signatures
- Introduction to Digital Signatures
- DSA

- Database protection
- E-Cash
- E-Voting
- DRM
- Biometrics
- Anonymity

- Digital Signatures
- Classical Ciphers
- Beale Cipher
- Transposition Ciphers
- Caesar cipher
- Atbash Cipher
- Autokey cipher
- Playfair Cipher
- Polyalphabetic substitution
- Scytale
- Substitution cipher
- nomenclator
- Permutation Cipher
- Affine cipher
- Vigenère cipher
- Polybius square
- ADFGVX cipher
- Fractionation (Polybius square, straddling checkerboard, CT-37c conversion table, etc.)

- Contemporary Ciphers
- Symmetric Ciphers
- Enigma Machine
- Solitaire cipher
- One-Time Pads
- Ciphersaber
- Data Encryption Standard (DES)
- Advanced Encryption Standard

- Asymmetric Ciphers
- Overview
- A Basic Public Key Example
- RSA
- ElGamal
- Elliptic Curve
- Blum-Goldwasser

- Hashes
- MD5
- SHA-1
- SHA-2
- RadioGatún, the direct predecessor of SHA-3
- SHA-3
- RIPEMD-160
- Tiger
- message authentication code (often MAC); A MAC algorithm is sometimes called a keyed (cryptographic) hash function.

- Symmetric Ciphers
- Protocols
- Authentication protocols
- e.g. Kerberos

- Key exchange protocols
- Diffie-Hellman

- Secure Communications
- e.g. SSL, SSH
- Generate a keypair using OpenSSL

- Authentication protocols

**Part V: Cryptography and Society**

- The Changing Nature of Cryptographic Use
- Cryptography, Governments and Laws
- Expectations of Normal Users

**Part VI: Miscellaneous**

- Future Possibilities
- Quantum Cryptography
- Faster, More Parallel Linear Computers

**Course Category: **
Blockchain

#### Would you like to learn Cryptography?

Simply, click the "Book" button of Cryptography and proceed to the payment method. Enter your desired schedule of training. You will receive an email confirmation for Cryptography and a representative / trainer will get in touch with you.

## What you get

### Money back guarantee

If the course Cryptography doesn't have a trainer available on your preferred schedule, you may withdraw your payment.

### Remote session with live human

Trainings for Cryptography are not pre-recorded video. You may interact with your instructor in real-time.

### Instructor access to revolutionary training environment DaDesktop

DaDesktop is an interactive cloud desktop environment solution for trainers and participants.