mhrd logo inflibnet logo ugc logo

Module Details

Course : P-11.cryptography And Network

Subject : Computer Science

No. of Modules : 40

Level : PG

Source : E-PG Pathshala

Back

Sr. No. Title E-Text Video URL Metadata
1 M-08. algebraic structures and finite fields 1 - Click Here
2 M-09. algebraic structures and finite fields 2 - Click Here
3 M-04. transposition cipher and cryptanalysis - Click Here
4 M-10. prime„Ę‚Ä‚ôs euler and fermat„Ę‚Ä‚ôs theorem - Click Here
5 M-12. exponentiation and logarithm - Click Here
6 M-11. chinese remainder theorem - Click Here
7 M-07. modular exponentiation - Click Here
8 M-06. modular arithmetic - Click Here
9 M-05. number theory - Click Here
10 M-26. diffie - hellman key exchange - Click Here
11 M-30. digital signature - Click Here
12 M-24. elliptic curve cryptosystem - Click Here
13 M-23. elgam m al cryptosystem - Click Here
14 M-25. key management - Click Here
15 M-29. hash and mac algorithms - Click Here
16 M-22. rsa cryptosystem - Click Here
17 M-27. security models - Click Here
18 M-28. hash algorithms - Click Here
19 M-40. wlan security - Click Here
20 M-03. subst itution cipher and cryptanalysis - Click Here
21 M-01. introduction to network security - Click Here
22 M-02. classical cryptography - - Click Here
23 M-20. advanced encryption standard (part2) - Click Here
24 M-19. advanced encryption standard (part1) - Click Here
25 M-14. stream cipher and block cipher - Click Here
26 M-17. data encryption standard - Click Here
27 M-21. public key cryptography - Click Here
28 M-18. modes of operation - Click Here
29 M-13. modern cryptography - Click Here
30 M-16. s implified des - Click Here
31 M-15. rc4 - Click Here
32 M-39. introduction to wireless lan security standards - Click Here
33 M-32. public key infrastructure - Click Here
34 M-33. electronic mail security - pgp - Click Here
35 M-36. web security :ssl and tls - Click Here
36 M-38. need for security in networks - Click Here
37 M-31. authentication application kerberos - Click Here
38 M-34. security attacks - Click Here
39 M-35. ip security - Click Here
40 M-37. firewalls - Click Here