-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:Diffie Hellman AlgorithmHow asymmetric (public key) encryption works?
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:Unit 1 , Unit 2, Unit 3, Unit 1
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication applications and Kerberos , X.509 Authentication services, Roles of Firewalls, Firewall related terminology and Types of Firewalls , Firewall designs and SET for E-Commerce Transactions. , Intruder and Intrusion detection system , Virus and related threats, Countermeasures, Firewalls design principles, Trusted systems
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication requirement and Authentication function , MAC and Hash function
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Services, Mechanisms and attacks, OSI security architecture, Substitution techniques, Transposition techniques and Steganography, FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic, Euclid’s algorithm, Finite fields, Polynomial Arithmetic, Prime numbers, Fermat’s and Euler’s theorem, Testing for primality , The Chinese remainder theorem, Discrete logarithms.
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:Puzzles
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys, privacy, Authentication of the source, Message Integrity and Non-repudiation, Pretty Good Privacy and S/MIME., IPSecurity: Overview of IPSec, IP and IPv6, Authentication Header and Encapsulation Security Payload(ESP), Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). , Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication, PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding, Secure Electronic Transaction (SET).
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IAE-1
-
Assignment
Assignment topic is RSA and due date is 26-08-2019.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Block cipher principles and block cipher modes of operation, Data Encryption Standard, Advanced Encryption Standard (AES), Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation, Triple DES and Blowfish, RC5 algorithm. , Principles of public key cryptosystems, The RSA algorithm and Key management , Diffie Hellman Key exchange, Elliptic curve arithmetic and Elliptic curve cryptography
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IA 2
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Services, Mechanisms and attacks, OSI security architecture, Network security model and Classical Encryption techniques, Symmetric cipher model
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:Introduction to Cryptography
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:Confidentiality and PrivacyCIA TraidCryptography
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IA 3 Sample Questions
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:Part A, Part A
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:How PGP Works?PGP ConfidentialityPGP Confidentiality and AuthenticationIP Sec OverviewIPSec ESP
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:CNS Entire CourseIKEIP SecBlowfishRC5Public Key Cryptography
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IA Answer Key
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Security of hash function and MAC, MD5 and SHA , HMAC and CMAC , Digital signature and authentication protocols , DSS, ElGamal and Schnorr