Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned...
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned...
Lecture 5: Block Cipher
30mLecture 4: Play Fair Cipher.
30mLecture 3: Cryptanalysis on Substitution Cipher (Frequency Analysis ).
30mLecture 2: Classical Cryptosystem.
30mLecture 1: Introduction to Cryptography.
30mLecture 10: Pseudorandom Sequence
28mLecture 9: Stream Cipher.
28mLecture 8: Triple DES and Modes of Operation.
28mLecture 7: DES (Contd.).
28mLecture 6: Data Encryption Standard (DES).
28mLecture 15: Modular Inverse.
28mLecture 14: Number Theory
28mLecture 13: Abstract algebra (contd.)
28mLecture 12: Mathematical background.
28mLecture 11: LFSR based Stream Cipher
28mLecture 20: Polynomial Arithmetic.
29mLecture 19: Eular's theorem, Quadratic Residue
29mLecture 18: Fermat's Little Theorem, Eular PhiFunction
29mLecture 17: Extended Euclid Algorithm
29mLecture 16: Modular Inverse
29mLecture 25: RSA Cryptosystem
33mLecture 24: Knapsack Cryptosystem.
33mLecture 23: Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.
33mLecture 22: Advanced Encryption Standard (AES) (Contd.)
33mLecture 21: Advanced Encryption Standard (AES)
33mLecture 30: Elliptic curve Modulo a Prime.
31mLecture 29: Elliptic Curve over the Reals
31mLecture 28: ElGamal Cryptosystem.
31mLecture 27: Primarily Testing
31mLecture 26: More on RSA
31mLecture 34: Legendre and Jacobi Symbol
28mLecture 33: Rabin Cryptosystem
28mLecture 32: Chinese Remainder Theorem
28mLecture 35: Jacobi Symbol (Contd.)
28mLecture 31: Generalised ElGamal Public Key Cryptosystem
28mLecture 40 : Hash Function
34mLecture 38 : Key Management.
34mLecture 37: Digital Signature.
34mLecture 39 : Key Exchange
34mLecture 36: Message Authentication.
34mLecture 44 : Digital Signature Standard (DSS)
30mLecture 45 : More on Key Exchange Protocol
30mLecture 43 : Secure Hash Algorithm (SHA).
30mLecture 42 : Cryptographic Hash Function
30mLecture 41 : Universal Hashing.
30mLecture 49 : More on Differential Cryptanalysis
27mLecture 50 : Linear Cryptanalysis
27mLecture 48 : Differential Cryptanalysis
29mLecture 47 : Time- Memory Trade- off Attack
29mLecture 46 : Cryptanalysis
29mLecture 51 : Cryptanalysis on Stream Cipher
24mLecture 52 : Modern Stream Ciphers
24mLecture 53 : Shamir's secret sharing and BE
24mLecture 54 : Identity based Encryption (IBE)
29mLecture 55 : Attribute based Encryption (ABE)
29mLecture 56:Functional Encryption
30mLecture 57:Solving discrete log problem
30mLecture 58:Implementation Attacks
26mLecture 59:The Secure Sockets Layer
26mLecture 60:Pretty Good Privacy
29m