Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/anishlearnstocode/cryptography-and-information-theory
Coursera Course on Cryptography and Information Theory part of larger Applied Cryptography 🔐 Specialization by Univrsity of Colorado 🎓 on Coursera.
https://github.com/anishlearnstocode/cryptography-and-information-theory
coursera cryptography information-theory solutions
Last synced: 28 days ago
JSON representation
Coursera Course on Cryptography and Information Theory part of larger Applied Cryptography 🔐 Specialization by Univrsity of Colorado 🎓 on Coursera.
- Host: GitHub
- URL: https://github.com/anishlearnstocode/cryptography-and-information-theory
- Owner: anishLearnsToCode
- License: mit
- Created: 2020-07-31T20:03:34.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-09-17T13:51:50.000Z (over 4 years ago)
- Last Synced: 2024-05-01T20:15:54.656Z (8 months ago)
- Topics: coursera, cryptography, information-theory, solutions
- Homepage:
- Size: 1.08 MB
- Stars: 12
- Watchers: 3
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Cryptography and Information Theory @Coursera
__~University of Colorado__[![specialization](https://img.shields.io/badge/specialization-Applied%20Cryptography-1f72ff.svg)](https://github.com/anishLearnsToCode/applied-cryptography)
[![course-list](https://img.shields.io/badge/also%20see-Coursera%20Courses-1f72ff.svg)](https://github.com/anishLearnsToCode/course-list#coursera)This is part of the 4 course specialization
[Applied Cryptography](https://github.com/anishLearnsToCode/applied-cryptography)
by the University of Colorado. This is the first course in this specialization.## 📖 Overview
- [Week 1: Cryptography Overview](#week-1-cryptography-overview)
- [Week 2: Information Entropy](#week-2-information-entropy)
- [Week 3: Brute Force Attacks and Cryptanalysis](#week-3-brute-force-attacks-and-crypt-analysis)
- [Week 4: Computational Security and Side Channel Attacks](#week-4-computational-security-and-side-channel-attacks)
- [Certificate](#-certificate)## Week 1: Cryptography Overview
- [Peer Graded Assignment: Alice-Bob-Eve Framework](week1/Caesar%20Cipher%20Alice-Bob-Eve.pdf)
- [Kerchoff's Principle and Security by Obscurity](week1/kerchoffs-principles-security-by-obscurity-quiz.md)
- [Discussion Prompt: Discuss the pros and cons of the two contrasting principles, Kerckhoff's Principle vs. Security by Obscurity](week1/discussion-prompt.md)## Week 2: Information Entropy
- [Practice Quiz - Throwing a Dice](week2/practice-quiz-throwing-a-dice.md)
- [Quiz - Entropy: Balls in A Bin](week2/quiz-entropy-balls-in-a-bin.md)## Week 3: Brute Force Attacks and Crypt Analysis
- [Quiz - Brute Force Attack, Cryptanalysis and One Time Pad](week3/quiz-brute-force-attack-cryptanalysis.md)## Week 4: Computational Security and Side-Channel Attacks
- No quizzes or assignments## [🎓](http://coursera.org/verify/XPFM28CP9KHX) Certificate
![certificate](assets/certificate.PNG)