2023 2024 Student Forum > Management Forum > Main Forum

 
  #1  
28th May 2015, 04:09 PM
Unregistered
Guest
 
Cryptography and Network Security IIT Kharagpur

Can you provide me the Cryptography and Network Security video lectures of IIT or Indian Institutes of Technology in Kharagpur? Are the video lectures of Cryptography and Network Security available on the official website of IIT or Indian Institutes of Technology in Kharagpur?
Similar Threads
Thread
MBA jesuit network
Cryptography and Network Security Syllabus Anna University
IIT Bombay cryptography
MBA Network Security
Cryptography And Network Security BPUT Questions
Network Course
MBA Jesuit Network
Free Network Security Training
Distance Education Diploma Course in Network Security in India
MBA network security
Network Security Classes
Network Security Training Online
BITS Pilani Cryptography
IIT Kharagpur Kharagpur West Bengal
IIT Kharagpur - Indian Institute of Technology Kharagpur India
Cryptography IIT Delhi
Topics for Project on Network and Security
Cryptography courses in Chennai
Cryptography Courses In Kerala
MMC Network Marketing
  #2  
12th February 2016, 01:58 PM
Unregistered
Guest
 
Re: Cryptography and Network Security IIT Kharagpur

Hello buddy ! I am a student of IIT kharragpur , will you please provide me Cryptography and Network Security syllabus ?
  #3  
12th February 2016, 01:58 PM
Super Moderator
 
Join Date: May 2012
Re: Cryptography and Network Security IIT Kharagpur

As you want here we provides you IIT Kharagpur Cryptography and
Network Security syllabus as follows

Introduction and Mathematical Foundations

Introduction

Overview on Modern Cryptography

Number Theory


Probability and Information Theory

Classical Cryptosystems

Classical Cryptosystems

Cryptanalysis of Classical Cryptosystems

Shannon’s Theory: I

Shannon’s Theory: II

Shannon’s Theory: III

Symmetric Key Ciphers

Symmetric Key Ciphers

Modern Block Ciphers (DES)

Modern Block Cipher (AES)

Modern Block Cipher (AES) contd.

Cryptanalysis of Symmetric Key Ciphers

Linear Cryptanalysis

Differential Cryptanalysis

Other Cryptanalytic Techniques

Overview on S-Box Design Principles

Modes of operation of Block Ciphers

Stream Ciphers and Pseudorandomness


Stream Ciphers


Pseudorandom functions

Hash Functions and MACs

Hash functions: The Merkle Damgard Construction

Message Authentication Codes (MACs)

Asymmetric Key Ciphers: Construction and Cryptanalysis

More Number Theoretic Results

The RSA Cryptosystem

Primality Testing

Factoring Algorithms

Other attacks on RSA and Semantic Security of RSA

The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange
algorithm

The ElGamal Encryption Algorithm

Cryptanalysis of DLP

Digital Signatures

Signature schemes: I

Signature schemes: II

Modern Trends in Asymmetric Key Cryptography

Elliptic curve based cryptography: I

Elliptic curve based cryptography: II

Network Security

Secret Sharing Schemes

A Tutorial on Network Protocols, Kerberos

Pretty Good Privacy (PGP)

Secure Socket Layer (SSL)

Intruders and Viruses

Firewalls


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 02:16 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4