#1
28th May 2015, 04:09 PM
| |||
| |||
Cryptography and Network Security IIT Kharagpur
Can you provide me the Cryptography and Network Security video lectures of IIT or Indian Institutes of Technology in Kharagpur? Are the video lectures of Cryptography and Network Security available on the official website of IIT or Indian Institutes of Technology in Kharagpur?
|
#2
12th February 2016, 01:58 PM
| |||
| |||
Re: Cryptography and Network Security IIT Kharagpur
Hello buddy ! I am a student of IIT kharragpur , will you please provide me Cryptography and Network Security syllabus ?
|
#3
12th February 2016, 01:58 PM
| |||
| |||
Re: Cryptography and Network Security IIT Kharagpur
As you want here we provides you IIT Kharagpur Cryptography and Network Security syllabus as follows Introduction and Mathematical Foundations Introduction Overview on Modern Cryptography Number Theory Probability and Information Theory Classical Cryptosystems Classical Cryptosystems Cryptanalysis of Classical Cryptosystems Shannon’s Theory: I Shannon’s Theory: II Shannon’s Theory: III Symmetric Key Ciphers Symmetric Key Ciphers Modern Block Ciphers (DES) Modern Block Cipher (AES) Modern Block Cipher (AES) contd. Cryptanalysis of Symmetric Key Ciphers Linear Cryptanalysis Differential Cryptanalysis Other Cryptanalytic Techniques Overview on S-Box Design Principles Modes of operation of Block Ciphers Stream Ciphers and Pseudorandomness Stream Ciphers Pseudorandom functions Hash Functions and MACs Hash functions: The Merkle Damgard Construction Message Authentication Codes (MACs) Asymmetric Key Ciphers: Construction and Cryptanalysis More Number Theoretic Results The RSA Cryptosystem Primality Testing Factoring Algorithms Other attacks on RSA and Semantic Security of RSA The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange algorithm The ElGamal Encryption Algorithm Cryptanalysis of DLP Digital Signatures Signature schemes: I Signature schemes: II Modern Trends in Asymmetric Key Cryptography Elliptic curve based cryptography: I Elliptic curve based cryptography: II Network Security Secret Sharing Schemes A Tutorial on Network Protocols, Kerberos Pretty Good Privacy (PGP) Secure Socket Layer (SSL) Intruders and Viruses Firewalls |