-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication requirement – Authentication function, MAC – Hash function, Security of hash function and MAC , SHA, Digital signature and authentication protocols, Digital Signature Standard (DSS), Entity Authentication: Biometrics, Passwords, Challenge Response protocols, Electronic Mail security, PGP, S/MIME, IP security, Web Security, SYSTEM SECURITY: Intruders, Firewalls.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures- Groups, Rings, Fields, Modular arithmetic-Euclid’s algorithm, Congruence and matrices, SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES, Differential and linear cryptanalysis , Block cipher design principles – Block cipher mode of operation , Evaluation criteria for AES – Advanced Encryption Standard-01, Evaluation criteria for AES – Advanced Encryption Standard-02, RC4 – Key distribution, MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing, Factorization, Euler’s totient function, Fermat’s and Euler’s Theorem, Chinese Remainder Theorem, Key distribution – Key management, Diffie Hellman key exchange, ASYMMETRIC KEY CIPHERS: RSA cryptosystem
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Introduction to cryptography, Security trends. Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security, Security attacks, services and mechanisms – OSI security architecture, Classical encryptions techniques: substitution techniques-01, Classical encryptions techniques: substitution techniques-02, Transposition Techniques and Steganography, Foundations of Modern Cryptography-Cryptanalysis, Perfect security – Information theory – Product cryptosystem