Starting a new Lecture Notes Series on Cryptography & Network Security
Youtube Lecture Playlist CreditsChannel Name: Neso Academy
So Let Us Start to This Journey of Learning
Cryptography & Network Security By Lecture Notes together!
Lecture 2: CIA Triad
Lecture 3: The OSI Security Architecture
Lecture 4: Security Attacks
Lecture 5: Security Services
Lecture 6: Security Mechanisms
Lecture 7: Network Security Model
Lecture 8: Cryptography
Lecture 9: Cryptography – Key Terms
Lecture 10: Cryptanalysis
Lecture 11: Brute Force Attack
Lecture 12: Classical Encryption Techniques
Lecture 13: Caesar Cipher (Part 1)
Lecture 14: Caesar Cipher (Part 2)
Lecture 15: Monoalphabetic Cipher
Lecture 16: Playfair Cipher (Part 1)
Lecture 17: Playfair Cipher (Part 2)
Lecture 18: Playfair Cipher (Solved Question)
Lecture 19: Hill Cipher (Encryption)
Lecture 20: Hill Cipher (Decryption)
Lecture 21: Polyalphabetic Cipher (Vigenère Cipher)
Lecture 22: Polyalphabetic Cipher (Vernam Cipher)
Lecture 23: One Time Pad
Lecture 24: Rail Fence Technique
Lecture 25: Row Column Transposition Ciphering Technique
Lecture 26: Steganography
Lecture 27: LSB Steganography - Demo
Lecture 28: Cryptography (Solved Questions)
Lecture 29: Abstract Algebra and Number Theory
Lecture 30: Prime Numbers in Cryptography
Lecture 31: Modular Arithmetic (Part 1)
Lecture 32: Modular Arithmetic (Part 2)
Lecture 33: Modular Exponentiation (Part 1)
Lecture 34: Modular Exponentiation (Part 2)
Lecture 35: GCD - Euclidean Algorithm (Method 1)
Lecture 36: GCD - Euclidean Algorithm (Method 2)
Lecture 37: Relatively Prime (Co-Prime) Numbers
Lecture 38: Euler’s Totient Function (Phi Function)
Lecture 39: Euler’s Totient Function (Solved Examples)
Lecture 40: Fermat's Little Theorem
Lecture 41: Euler's Theorem
Lecture 42: Primitive Roots
Lecture 43: Multiplicative Inverse
Lecture 44: Extended Euclidean Algorithm (Solved Example 1)
Lecture 45: Extended Euclidean Algorithm (Solved Example 2)
Lecture 46: Extended Euclidean Algorithm (Solved Example 3)
Lecture 47: The Chinese Remainder Theorem (Solved Example 1)
Lecture 48: The Chinese Remainder Theorem (Solved Example 2)
Lecture 49: The Discrete Logarithm Problem
Lecture 50: The Discrete Logarithm Problem (Solved Example)
Lecture 51: Prime Factorization (Fermat's Factoring Method)
Lecture 52: Testing for Primality (Fermat's Test)
Lecture 53: Testing for Primality (Miller-Rabin Test)
Lecture 54: Group and Abelian Group
Lecture 55: Cyclic Group
Lecture 56: Rings, Fields and Finite Fields
Lecture 57: Stream Cipher vs. Block Cipher
Lecture 58: Feistel Cipher Structure
Lecture 59: Introduction to Data Encryption Standard (DES)
Lecture 60: Single Round of DES Algorithm
Lecture 61: The F Function of DES (Mangler Function)
Lecture 62: Key Scheduling and Decryption in DES
Lecture 63: Avalanche Effect and the Strength of DES
Lecture 66: AES Encryption and Decryption
Lecture 67: AES Round Transformation
Lecture 68: AES Key Expansion
Lecture 69: AES Security and Implementation Aspects
Lecture 70: Multiple Encryption and Triple DES
Lecture 71: Block Cipher Modes of Operation
Lecture 72: Electronic Codebook (ECB)
Lecture 73: Cipher Block Chaining (CBC)
Lecture 74: Cipher Feedback (CFB)
Lecture 75: Output Feedback (OFB)
Lecture 76: Counter Mode (CTR)
Lecture 78: Pseudorandom Number Generator (PRNG)
Lecture 79: Golomb’s Randomness Postulates