Want to keep learning?

This content is taken from the Coventry University & Institute of Coding's online course, An Introduction to Cryptography. Join the course to learn more.

The big question

Welcome to the second week in An Introduction to Cryptography.

Last week we saw how cryptography and cryptanalysis has had an effect on history right up to the present day. This week we will begin to look at some of the core concepts of cryptography and cryptanalysis in more detail.

This week…

Through this week’s activities you will:

  • explore the importance of hashing by looking at how passwords are stored and secured
  • describe the concepts of entropy, pseudorandomness, unicity and hashing
  • investigate the limitations of the One-Time Pad

Your task

Let’s reconsider our big question:

Is it possible to prove the security of encrypted data, or will every algorithm fail, given sufficient time or computing power?

Have any of the discussions you have had so far during this course influenced your opinion?

Share this article:

This article is from the free online course:

An Introduction to Cryptography

Coventry University