Free Course Image Advanced Topics in Cryptography

Free online courseAdvanced Topics in Cryptography

Duration of the online course: 22 hours and 34 minutes

5

StarStarStarStarStar

(2)

Build modern proof skills in this free cryptography course—interactive proofs, Fiat–Shamir, SNARGs and LWE—ideal for advancing in cybersecurity research.

In this free course, learn about

  • Interactive proofs: prover/verifier model, completeness and soundness, role of verifier randomness
  • Sum-check protocol: proving sums of low-degree polynomials; applications within interactive proofs
  • How verifier randomness enforces soundness in sum-check and in protocols built on it
  • Doubly efficient interactive proofs: near-linear prover time and polylog verifier time
  • GKR protocol: succinct verification of arithmetic circuit computations using iterative sum-check
  • How GKR soundness depends on random challenges and low-degree testing/Schwartz-Zippel ideas
  • PCPs: why probabilistic checking enables sublinear verification and how PCPs relate to IPs
  • PCP via GKR: transforming interactive proofs into PCP-like objects and succinct verification tools
  • Succinct arguments from PCPs using collision-resistant hashes (Merkle commitments to large proofs)
  • Kilian–Micali protocol: constructing succinct arguments by combining PCPs with hash commitments
  • Collision resistance: why it prevents forging openings/paths and ensures argument soundness
  • Fiat–Shamir paradigm: converting public-coin interactive proofs into non-interactive proofs
  • Zero-knowledge basics: proving statements without revealing the witness; intuition and use-cases
  • BARGs from LWE: succinct non-interactive arguments for batch NP and links to SNARGs/non-signaling PCPs

Course Description

Strengthen your ability to reason about cutting-edge security systems by mastering the proof techniques that sit behind today’s most powerful cryptographic constructions. This free online course goes beyond introductory primitives and focuses on how modern cryptography is proven secure, how efficiency is achieved, and why certain proof systems have become central to real-world applications in cybersecurity and privacy. If you want to move from knowing definitions to understanding how cryptographers actually build and validate advanced protocols, this course is designed to bridge that gap.

You will explore interactive proofs and the sum-check protocol as a foundational tool for verifying complex statements with limited verifier effort, highlighting why carefully designed randomness is essential for soundness. From there, you will connect these ideas to doubly efficient interactive proofs and the GKR framework, building intuition for how a verifier can be much faster than the prover while still remaining confident in the result. This perspective is especially valuable when thinking about verification in constrained environments such as blockchains, secure computation, and large-scale systems where auditing costs must remain low.

The course then advances to probabilistically checkable proofs and their role in enabling succinct verification, setting the stage for interactive arguments that rely on cryptographic assumptions. You will see how collision-resistant hashing becomes a practical backbone for constructing succinct arguments, and how these components fit together into classical protocols that shaped the field. As the material transitions to the Fiat–Shamir paradigm, the focus turns to making proofs non-interactive while preserving security guarantees, including a careful look at soundness in the standard model—an important lens for evaluating claims you may encounter in papers or implementations.

Finally, you will reach contemporary topics such as succinct non-interactive arguments for batch NP built from LWE and the relationships between BARGs, SNARGs, and non-signaling PCP connections. By engaging with conceptual checkpoints throughout, you will refine your understanding of why these constructions work, what assumptions they depend on, and how to communicate proof ideas clearly. The result is a deeper, more practical cryptography mindset that supports advanced study, security engineering judgment, and research-oriented problem solving.

Course content

  • Video class: Lecture 1: Interactive Proofs and the Sum-Check Protocol, Part 1 1h31m
  • Exercise: What is the topic of the advanced class presented in the transcript?
  • Video class: Lecture 1: Interactive Proofs and the Sum-Check Protocol, Part 2 1h06m
  • Exercise: Why is randomness essential in the verifier's role in the sum-check protocol?
  • Video class: Lecture 2: Doubly Efficient Interactive Proofs, Part 1 1h53m
  • Exercise: What is the Sumcheck protocol used for in the context of interactive proofs?
  • Video class: Lecture 2: Doubly Efficient Interactive Proofs, Part 2 42m
  • Exercise: How does the verifier's randomness affect the GKR protocol's soundness?
  • Video class: Lecture 3: Continuation of the GKR Protocol and Corollaries 1h21m
  • Exercise: What is the primary purpose of the GKR (Geometry Coding for Polynomial Proving)?
  • Video class: Lecture 4: PCP via GKR and Interactive Arguments, Part 1 1h29m
  • Exercise: What is the purpose of probabilistically checkable proofs (PCPs) as discussed in the lecture?
  • Video class: Lecture 4: PCP via GKR and Interactive Arguments, Part 2 1h10m
  • Exercise: What is the main purpose of using a collision-resistant hash function in the construction of succinct arguments?
  • Video class: Lecture 5: The Kilian-Micali Protocol, Part 1 1h44m
  • Exercise: What is the purpose of a Probabilistically Checkable Proof (PCP)?
  • Video class: Lecture 5: The Kilian-Micali Protocol, Part 2 56m
  • Exercise: What is the key reason this hash function is considered collision-resistant?
  • Video class: Lecture 6: Fiat-Shamir Paradigm and Zero-Knowledge Proofs, Part 1 1h32m
  • Video class: Lecture 6: Fiat-Shamir Paradigm and Zero-Knowledge Proofs, Part 2 1h08m
  • Video class: Lecture 7: Soundness of the Fiat-Shamir Paradigm in the Standard Model, Part 1 1h33m
  • Video class: Lecture 7: Soundness of the Fiat-Shamir Paradigm in the Standard Model, Part 2 1h04m
  • Video class: Lecture 8: Succinct Non-Interactive Arguments for Batch NP (BARGs) from LWE, Part 1 1h21m
  • Video class: Lecture 8: Succinct Non-Interactive Arguments for Batch NP (BARGs) from LWE, Part 2 1h14m
  • Video class: Lecture 9: BARGs Implies SNARGs and Connection to Non-Signaling PCPs, Part 1 1h27m
  • Video class: Lecture 9: BARGs Implies SNARGs and Connection to Non-Signaling PCPs, Part 2 1h14m

This free course includes:

22 hours and 34 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: Advanced Topics in Cryptography

A

Akash

StarStarStarStarStar

this app so amazing their lecture is so knowledgeable

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate