Symmetric-key algorithms use the same cryptographic key for both encryption and decryption of data. This shared secret between two or more parties is used to maintain a private information link, but requires all parties to have access to the key. Symmetric-key encryption is usually better for bulk encryption due to its smaller key size and faster transmission. Asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.
Stanford University
Winter 2023
This course offers an introduction to cryptographic techniques used in computer security, covering encryption, message integrity, digital signatures, key management, and more. It is suitable for advanced undergraduates and masters students with some proof techniques and programming experience.
No concepts data
+ 55 more conceptsUniversity of Washington
Autumn 2021
This course covers a wide range of computer security topics, including software security, cryptography, web security, malware, and physical security. It encourages a "security mindset" while requiring a firm understanding of computer science fundamentals and command-line Unix development environment.
No concepts data
+ 18 more conceptsBrown University
Spring 2023
Applied Cryptography at Brown University offers a practical take on securing systems. By learning foundational cryptographic algorithms and advanced topics like zero-knowledge proofs and post-quantum cryptography, students gain both theoretical insights and hands-on experience in implementing cryptosystems using C++ and crypto libraries. Label: State-of-art concepts.
No concepts data
+ 63 more concepts