Fundamental Understanding on Cryptography and Network Security
Lecture Note
Crypt Analysis
Substituition Techniques
Playfair Cipher, Hill Cipher and Polyalphabetic Ciphers
Problems on Ceaser Cipher, Playfair Ciphers and Polyaphabetic Ciphers
Differential Cryptanalysis
International Date Encryption Algorithm (IDEA)
Public Key Cryptography and Fermat's Theorem
Euclidean Algorithm
Properties of Congruences
RSA Algorithm
Key Management-Distribution of Public keys
Diffie Helman Key Exchange
Point Addition, Point Doubling and Extended Euclidean Algorithm
Authentication and Levels of Functions Used in Authentication
Message Encryption and Public Key Encryption
SHA-1 Compression Function
Message Digest Algorithm (MD5)
Producer Consumer Problem Using Semaphores
Lab
Lines and Planes in Space
Alternating Series
Mathematics
CS4961 | Software Design Laboratory
CS4780 | Cryptography and Information Security
University Details
Address:
Website:
Students Population:
No reviews yet
Write your comment