Starting a new Lecture Notes Series on Computer - Cryptography and Network Security
%20(4).png)
%20(4).png)
Youtube Lecture Playlist CreditsChannel Name: nptelhrd
So Let Us Start to This Journey of Learning
Computer - Cryptography and Network Security By Lecture Notes together!
Lecture 1: Introduction
Lecture 2: Overview on Modern Cryptography
Lecture 3: Introduction to Number Theory
Lecture 4: Probability and Information Theory
Lecture 5: Classical Cryptosystems
Lecture 6: Cryptanalysis of Classical Ciphers
Lecture 7: Shannons Theory
Lecture 8: Shannons Theory (Contd...1)
Lecture 9: Shannons Theory (Contd...2)
Lecture 10: Symmetric Key Ciphers
Lecture 11: Block Cipher Standards (DES)
Lecture 12: Block Cipher Standards (AES)
Lecture 13: Block Cipher Standards (AES) (Contd.)
Lecture 14: Linear Cryptanalysis
Lecture 15: Differential Cryptanalysis
Lecture 16: Few other Cryptanalytic Techniques
Lecture 17: Overview on S-Box Design Principles
Lecture 18: Modes of Operation of Block Ciphers
Lecture 19: Stream Ciphers
Lecture 20: Stream Ciphers (Contd...1)
Lecture 21: Stream Ciphers (Contd...2)
Lecture 22: Pseudorandomness
Lecture 23: Cryptographic Hash Functions
Lecture 24: Cryptographic Hash Functions (Contd...1)
Lecture 25: Cryptographic Hash Functions (Contd...2)
Lecture 26: Message Authentication Codes
Lecture 27: More Number Theoretic Results
Lecture 28: The RSA Cryptosystem
Lecture 29: Primality Testing
Lecture 30: Factoring Algorithms
Lecture 31: Some Comments on the Security of RSA
Lecture 32: Discrete Logarithm Problem (DLP)
Lecture 34: An Introduction to Elliptic Curve Cryptography
Lecture 35: Application of Elliptic Curves to Cryptography
Lecture 36: Implementation of Elliptic Curve Cryptography
Lecture 37: Secret Sharing Schemes
Lecture 38: A Tutorial on Network Protocols
Lecture 39: System Security
Lecture 40: Firewalls and Intrusion Detection Systems