Instructor: Dan Boneh, Stanford University
Online cryptography course preview: This page contains all the lectures in the free cryptography course. To officially take the course, including homeworks, projects, and final exam, please visit the course page at Coursera.
Go to course
Textbook: The following is a free textbook for the course. The book goes into more depth, including security proofs, and many exercises.
A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup (free)
Course syllabus, videos, and slides
Week 1 : Course overview and stream ciphers (chapters 2-3 in the (chapters 2-3 in the textbook
Slides for week 1:
What is cryptography?
Crash course in discrete probability
Stream Ciphers 1: the one-time pad and stream ciphers
Stream Ciphers 2: attacks and common mistakes
Stream Ciphers 3: real-world examples
Stream Ciphers 4: what is a secure cipher?
Week 2 : Block ciphers (chapters 4-5 in the (chapters 4-5 in the textbook
Slides for week 2:
pptx
Using block ciphers: pptx
Block ciphers: pdf Using block ciphers: pdf
Block Ciphers 1: overview
Block Ciphers 2: The Data Encryption Standard
Block Ciphers 3: AES and other constructions
How to Use Block Ciphers 1: one-time key
How to Use Block Ciphers 2: many-time key
Week 3 : Message integrity (chapters 6-8 in the (chapters 6-8 in the textbook
Slides for week 3:
pptx
Collision resistant hashing: pptx
Message integrity: pdf Collision resistant hashing: pdf
Message Integrity 1: definitions
Message Integrity 2: constructions
Collision Resistance 1: what is a collision resistant function?
Collision Resistance 2: constructions
HMAC: a MAC from a hash function
Week 4 : Authenticated encryption (chapter 9 in the (chapter 9 in the textbook
Slides for week 4:
pptx
Odds and ends: pptx
Authenticated encryption: pdf Odds and ends: pdf
Authenticated Encryption 1: why is it so important?
Authenticated Encryption 2: standard constructions
Authenticated Encryption 3: pitfalls
Odds and Ends 1: how to derive keys
Odds and Ends 2: searching on encrypted data
Odds and Ends 3: disk encryption and creditcard encryption
Week 5 : Basic key exchange (chapter 10 in the (chapter 10 in the textbook
Slides for week 5:
pptx
Crash course in number theory: pptx
Basic key exchange: pdf Crash course in number theory: pdf
Basic Key Exchange 1: problem statement
Basic Key Exchange 2: two solutions
Number Theory 1: modular arithmetic
Number Theory 2: easy and hard problems
Week 6 : Public-key encryption (chapters 11-12 in the (chapters 11-12 in the textbook
Slides for week 6:
Public Key Encryption from Trapdoor Permutations
Public Key Encryption from Trapdoor Permutations: RSA
Public Key Encryption from Trapdoor Permutations: attacks
Public Key Encryption From Diffie-Hellman: ElGamal
Public Key Encryption: summary
Week 7 : Digital signatures (chapters 13-14 in the (chapters 13-14 in the textbook
Slides for week 7: