-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br> MAC ,Hash function ,Security of hash function and MAC, </br>SHA, </br>Digital signature and authentication protocols, </br>Authentication applications, </br> Kerberos, X.509, </br>IP Security: Architecture, Authentication header, </br>Secure electronic transaction (SET), </br>Trusted systems, </br>Transport layer security, </br>Web Security: Secure socket layer , </br>Encapsulating security payloads, combining security associations, key management., </br>System Security: Intruders, Viruses and related threads, </br>Euler’s totient function, Fermat’s and Euler’s Theorem , </br>Chinese Remainder Theorem, </br>Diffie Hellman key exchange , </br> Exponentiation and logarithm
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Evaluation criteria for AES ,Advanced Encryption Standard, </br>Algebraic structures , Modular arithmetic,Euclid‟s algorithm, </br>Primes,Primality Testing, Factorization
-
Announcement*
Dear Students the Announcement* has been uploaded for the following topics:</br>Security trends, </br>Legal, Ethical and Professional Aspects of Security, </br>Need for Security at Multiple levels, Security Policies, </br> Model of network security
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>SDES, </br>Block cipher Principles of DES, </br>Strength of DES,Differential and linear cryptanalysis, </br>Block cipher design principles, Block cipher mode of operation, </br>Primes,Primality Testing, Factorization
-
Assignment
Assignment topic is Modulo Inverse and due date is 06-09-2024.
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>ALL, </br>Security attacks, services and mechanisms – OSI security architecture
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>ALL
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>All 5 Units
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:</br>Substitutional Cipher Techniques </br>ALL 5 Units
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Foundations of modern cryptography: perfect security , </br>information theory ,product cryptosystem , cryptanalysis., </br> transposition techniques, steganography, </br>Security trends, </br>Legal, Ethical and Professional Aspects of Security, </br>Need for Security at Multiple levels, Security Policies, </br> Model of network security , </br>Security attacks, services and mechanisms – OSI security architecture