Subject Details
Dept     : IT
Sem      : 6
Regul    : 19
Faculty : Ms. A Catherine Esther Karunya
phone  : NIL
E-mail  : catherine.a.aiml@snsct.org
251
Page views
34
Files
0
Videos
1
R.Links

Icon
Announcements

  • Resource Link

    Dear Students the Resource Link has been uploaded for the following topics:
    Cryptography and security

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Public Key crptosystems

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    Introduction to Encryption Standard

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    Public Key crptosystems,
    hash functions

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    The Chinese Remainder Theorem - Principles of Public Key Cryptosystem

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Distribution of Public Keys - X.509 Certificates,
    Symmetric Key Distribution Using Asymmetric Encryption,
    Key Management And Distribution

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    The RSA Algorithm,
    Diffie Hellman Key Exchange,
    ElGamal Cryptosystem,
    Public Key crptosystems,
    Cryptographic Hash Functions,
    Two Simple Hash Functions Requirements and Security ,
    Hash Functions Based on Cipher Block Chaining,
    Secure Hash Algorithm (SHA) - Message Authentication Codes,
    Message Authentication Requirements - Message Authentication Code,
    Security of MACs - MACs Based on Hash Functions (HMAC),
    Digital Signatures - ElGamal Digital Signature Scheme,
    Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Computer Security Concepts,
    The OSI Security Architecture,
    3 Security Attacks - A Model for Network Security,
    4 Symmetric Cipher Model,
    Substitution Techniques - Transposition Techniques,
    Block Cipher Principles - Data Encryption Standard (DES)- Example,
    Multiple Encryption and Triple DES ,
    Stream Ciphers - RC4,
    Principles of Pseudorandom Number Generation,
    Pseudorandom Number Generators -Divisibility and the Division Algorithm,
    The Euclidean Algorithm - Modular Arithmetic