Weekly study10 hours
Cryptographic Protocols and Implementations
Explore the principles of cryptographic protocols and implementations
This course builds upon the previous ones in order to show how the cryptographic concepts we have been working with are implemented in standard tools and libraries. We will examine common implementations and make use of cryptographic libraries to create software that communicates securely.
- Modelling and analysis using process algebras such as BAN logic, CSP, and applied pi calculus
- Protocols and implementation, SSL/TLS,IPSec
- Oauth, oauth2, flaws
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Compare cryptographic algorithms and implementations such as DES, 3DES, AES, Blowfish, serpent, Rijndael, RSA, SSL/TLS, Kerberos, Oauth
- Evaluate implementations based on their security, potential flaws, efficiency and prevalence
- Apply process algebras such as Pi Calculus, BAN logic and CSP
Who is the course for?
This course is for people who want to understand more about the way cryptography keeps our communications safe, either out of curiosity or to prepare for advanced study of the topic.
Please note that the individuals detailed in the “Who will you learn with?” section below, are current staff members and may be subject to change.