-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>FULL UNIT NOTES
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>FULL UNIT NOTES
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>UNIT 1
-
Assignment
Assignment topic is ASSIGNMENT 1 and due date is 06-09-2024.
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:</br>Cryptography Tutorial</br>cryptography</br>Cryptography and Network Security - NPTEL Course by IIT Kharagpur</br>Cryptography and Network Security - NPTEL Course by IIT Madras
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>Security attacks, services and mechanisms
-
Assignment
Assignment topic is Caeser cipher for lab and due date is 31-07-2024.
-
Assignment
Assignment topic is ceaer cipher and due date is .
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Security: Architecture, Authentication header, </br>Encapsulating security payloads, combining security associations,, </br>key management. Web Security: Secure socket layer, </br>transport layer security, </br>secure electronic transaction (SET), </br>System Security: Intruders, Viruses and related threads, </br>firewall design principals, </br>trusted systems
-
Announcement*
Dear Students the Announcement* has been uploaded for the following topics:</br>FULL UNIT NOTES, </br>FULL UNIT NOTES, </br>HANDWRITTEN NOTES , </br>HANDWRITTEN NOTES
-
Assignment
Assignment topic is ASYMMETRIC KEY CRYPTOGRAPHY and due date is 10-10-2024.
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>RSA</br>Diffie hellemen key exchange
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:</br>RSA, DIFFIE HELLMEN
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>prime and prime factorization
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic, </br>MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic, </br>Euclid‟s algorithm- Congruence and matrices, </br>Groups, Rings, Fields- Finite fields, </br>Block cipher Principles of DES – Strength of DES, </br>Differential and linear cryptanalysis, </br>Block cipher design principles – Block cipher mode of operation, </br>RC4 – Key distribution., </br>MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing, </br>Factorization – Euler’s totient function, </br>Fermat’s and Euler’s Theorem - Chinese Remainder Theorem, </br>Exponentiation and logarithm, </br>Diffie Hellman key exchange, </br>prime factorization
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>EMAIL SECURITY
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:</br>MAC</br>KERBEROS
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:</br>FULL UNIT 4
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>MAC</br>SHA
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>Authentication requirement – Authentication function, </br>MAC – Hash function – Security of hash function and MAC, </br>SHA , </br>Digital signature and authentication protocols – DSS, </br>Kerberos, </br>X.509, </br>Challenge Response protocols, </br>Authentication applications, </br>FULL UNIT NOTES
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:</br>Mathematical operations
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>transposition techniques,, </br>Classical encryption techniques: substitution techniques, </br>Security trends - Legal, Ethical and Professional Aspects of Security, </br>Need for Security at Multiple levels, Security Policies - Model of network security, </br>Security attacks, services and mechanisms, </br>OSI security architecture, </br>transposition techniques,, </br>Foundations of modern cryptography: perfect security – information theory
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:</br>UNIT 2
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:</br>FULL UNIT NOTES, </br>MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic