Главная
Study mode:
on
1
Introduction
2
Overview on Modern Cryptography
3
Introduction to Number Theory
4
Probability and Information Theory
5
Classical Cryptosystems
6
Cryptanalysis of Classical Ciphers
7
Shannons Theory
8
Shannons Theory (Contd...1)
9
Shannons Theory (Contd...2)
10
Symmetric Key Ciphers
11
Block Cipher Standards (DES)
12
Block Cipher Standards (AES)
13
Block Cipher Standards (AES) (Contd.)
14
Linear Cryptanalysis
15
Differential Cryptanalysis
16
Few other Cryptanalytic Techniques
17
Overview on S-Box Design Principles
18
Modes of Operation of Block Ciphers
19
Stream Ciphers
20
Stream Ciphers (Contd...1)
21
Stream Ciphers (Contd...2)
22
Pseudorandomness
23
Cryptographic Hash Functions
24
Cryptographic Hash Functions (Contd...1)
25
Cryptographic Hash Functions (Contd...2)
26
Message Authentication Codes
27
More Number Theoretic Results
28
The RSA Cryptosystem
29
Primality Testing
30
Factoring Algorithms
31
Some Comments on the Security of RSA
32
Discrete Logarithm Problem (DLP)
33
The Diffie-Hellman Problem and Security of ElGamal Systems
34
An Introduction to Elliptic Curve Cryptography
35
Application of Elliptic Curves to Cryptography
36
Implementation of Elliptic Curve Cryptography
37
Secret Sharing Schemes
38
A Tutorial on Network Protocols
39
System Security
40
Firewalls and Intrusion Detection Systems
41
Side Channel Analysis of Cryptographic Implementations
Description:
Instructor: Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography. Starting from the classical ciphers to modern-day ciphers, the course provides extensive coverage of the techniques and methods needed for the proper functioning of the ciphers. The course deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one-way functions and trapdoor functions and presents the construction and cryptanalysis of public-key ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also detailed. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols. Read more

Cryptography and Network Security

NPTEL
Add to list
0:00 / 0:00