Instructor: Dan Boneh, Stanford University

Online cryptography course preview: This page contains all the lectures in the free cryptography course. To officially take the course, including homeworks, projects, and final exam, please visit the course page at Coursera.

Go to course

Textbook: The following is a free textbook for the course. The book goes into more depth, including security proofs, and many exercises.

A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup (free)

Course syllabus, videos, and slides

Week 1 : Course overview and stream ciphers (chapters 2-3 in the (chapters 2-3 in the textbook

Slides for week 1:

What is cryptography?

Crash course in discrete probability

Stream Ciphers 1: the one-time pad and stream ciphers

Stream Ciphers 2: attacks and common mistakes

Stream Ciphers 3: real-world examples

Stream Ciphers 4: what is a secure cipher?

Week 2 : Block ciphers (chapters 4-5 in the (chapters 4-5 in the textbook

Slides for week 2:

pptx

Using block ciphers: pptx

Block ciphers: pdf Using block ciphers: pdf

Block Ciphers 1: overview

Block Ciphers 2: The Data Encryption Standard

Block Ciphers 3: AES and other constructions

How to Use Block Ciphers 1: one-time key

How to Use Block Ciphers 2: many-time key

Week 3 : Message integrity (chapters 6-8 in the (chapters 6-8 in the textbook

Slides for week 3:

pptx

Collision resistant hashing: pptx

Message integrity: pdf Collision resistant hashing: pdf

Message Integrity 1: definitions

Message Integrity 2: constructions

Collision Resistance 1: what is a collision resistant function?

Collision Resistance 2: constructions

HMAC: a MAC from a hash function

Week 4 : Authenticated encryption (chapter 9 in the (chapter 9 in the textbook

Slides for week 4:

pptx

Odds and ends: pptx

Authenticated encryption: pdf Odds and ends: pdf

Authenticated Encryption 1: why is it so important?

Authenticated Encryption 2: standard constructions

Authenticated Encryption 3: pitfalls

Odds and Ends 1: how to derive keys

Odds and Ends 2: searching on encrypted data

Odds and Ends 3: disk encryption and creditcard encryption

Week 5 : Basic key exchange (chapter 10 in the (chapter 10 in the textbook

Slides for week 5:

pptx

Crash course in number theory: pptx

Basic key exchange: pdf Crash course in number theory: pdf

Basic Key Exchange 1: problem statement

Basic Key Exchange 2: two solutions

Number Theory 1: modular arithmetic

Number Theory 2: easy and hard problems

Week 6 : Public-key encryption (chapters 11-12 in the (chapters 11-12 in the textbook

Slides for week 6:

Public Key Encryption from Trapdoor Permutations

Public Key Encryption from Trapdoor Permutations: RSA

Public Key Encryption from Trapdoor Permutations: attacks

Public Key Encryption From Diffie-Hellman: ElGamal

Public Key Encryption: summary

Week 7 : Digital signatures (chapters 13-14 in the (chapters 13-14 in the textbook

Slides for week 7: