Contents:
Introduction – Overview on Modern Cryptography – Introduction to Number Theory – Probability and Information Theory – Classical Cryptosystems-Cryptanalysis of Classical Ciphers-shannons Theory – Symmetric Key Ciphers – Block Cipher Standards – Linear Cryptanalysis – Differential Cryptanalysis – Few other Cryptanalytic Techniques – Overview on S-Box Design Principles -Modes of Operation of Block Ciphers – tream Ciphers – Pseudorandomness – Cryptographic Hash Functions – Message Authentication Codes – More Number Theoretic Results – The RSA Cryptosystem

primality Testing – Factoring Algorithms – Some Comments on the Security of RSA – Discrete Logarithm Problem (DLP) – The Diffie – Hellman Problem and Security of ElGamal Systems – An Introduction to Elliptic Curve Cryptography – Application of Elliptic Curves to Cryptography – Implementation of Elliptic Curve Cryptography – Secret Sharing Schemes – A Tutorial on Network Protocols-System Security – Firewalls and Intrusion Detection Systems – Side Channel Analysis of Cryptographic Implementations

Other Resources

Course Curriculum

Introduction Details 59:3
Overview on Modern Cryptography Details 58:23
Introduction to Number Theory Details 1:3:30
Probability and Information Theory Details 53:55
Classical Cryptosystems Details 57:39
Cryptanalysis of Classical Ciphers Details 51:54
Shannons Theory Details 44:46
Shannons Theory (Contd…1) I Details
Shannons Theory (Contd…2) II Details
Symmetric Key Ciphers Details 52:42
Block Cipher Standards (DES) Details 50:12
Block Cipher Standards (AES) I Details 58:27
Block Cipher Standards (AES) (Contd.) II Details 54:54
Linear Cryptanalysis Details 56:30
Differential Cryptanalysis Details 46:35
Few other Cryptanalytic Techniques Details 57:45
Overview on S-Box Design Principles Details 51:6
Modes of Operation of Block Ciphers Details 52:20
Stream Ciphers Details 48:35
Stream Ciphers (Contd…1) I Details 55:2
Stream Ciphers (Contd…2) II Details 47:8
Pseudorandomness Details 47:49
Cryptographic Hash Functions Details 49:38
Cryptographic Hash Functions (Contd…1) I Details 50:34
Cryptographic Hash Functions (Contd…2) II Details 49:6
Message Authentication Codes Details 51:52
More Number Theoretic Results Details 56:14
The RSA Cryptosystem Details 50:32
Primality Testing Details 50:33
Factoring Algorithms Details 1:17
Some Comments on the Security of RSA Details 41:19
Discrete Logarithm Problem (DLP) Details 58:37
The Diffie-Hellman Problem and Security of ElGamal Systems Details 57:51
An Introduction to Elliptic Curve Cryptography Details 58:49
Application of Elliptic Curves to Cryptography I Details 55:56
Implementation of Elliptic Curve Cryptography II Details 55:17
Secret Sharing Schemes Details 52:41
A Tutorial on Network Protocols Details 55:27
System Security Details 53:25
Firewalls and Intrusion Detection Systems Details 49:44
Side Channel Analysis of Cryptographic Implementations Details 48:21

These video tutorials are delivered by IIT Kharagpur as part of NPTEL online courses program.

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

About

FreeVideoLectures Provides you complete information about best courses online, Video tutorials, helps you in building a career !!

help@freevideolectures.com

Learn More About us

About Us
Privacy Policy
FAQ

FREEVIDEOLECTURES.COM ALL RIGHTS RESERVED.
top
FreeVideoLectures.com All rights reserved.

Setup Menus in Admin Panel