Cryptography and Network Security. Instructor: Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur.

FREE
This course includes
Hours of videos

1138 years, 9 months

Units & Quizzes

41

Unlimited Lifetime access
Access on mobile app
Certificate of Completion

The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography. Starting from the classical ciphers to modern day ciphers, the course provides an extensive coverage of the techniques and methods needed for the proper functioning of the ciphers. The course deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one way functions and trapdoor functions and presents the construction and cryptanalysis of public key ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also detailed. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols. (from nptel.ac.in)

Course Currilcum

  • Lecture 01 – Introduction Unlimited
  • Lecture 02 – Overview on Modern Cryptography Unlimited
  • Lecture 03 – Introduction to Number Theory Unlimited
  • Lecture 04 – Probability and Information Theory Unlimited
  • Lecture 05 – Classical Cryptosystems Unlimited
  • Lecture 06 – Cryptanalysis of Classical Ciphers Unlimited
  • Lecture 07 – Shannon’s Theory Unlimited
  • Lecture 08 – Shannon’s Theory (cont.) Unlimited
  • Lecture 09 – Shannon’s Theory (cont.) Unlimited
  • Lecture 10 – Symmetric Key Ciphers Unlimited
  • Lecture 11 – Block Cipher Standards: DES (Data Encryption Standard) Unlimited
  • Lecture 12 – Block Cipher Standards: AES (Advanced Encryption Standard) Unlimited
  • Lecture 13 – Block Cipher Standards: AES (cont.) Unlimited
  • Lecture 14 – Linear Cryptanalysis Unlimited
  • Lecture 15 – Differential Cryptanalysis Unlimited
  • Lecture 16 – Few Other Cryptanalytic Techniques Unlimited
  • Lecture 17 – Overview on S-Box Design Principles Unlimited
  • Lecture 18 – Modes of Operation of Block Ciphers Unlimited
  • Lecture 19 – Stream Ciphers Unlimited
  • Lecture 20 – Stream Ciphers (cont.) Unlimited
  • Lecture 21 – Stream Ciphers (cont.) Unlimited
  • Lecture 22 – Pseudorandomness Unlimited
  • Lecture 23 – Cryptographic Hash Functions Unlimited
  • Lecture 24 – Cryptographic Hash Functions (cont.) Unlimited
  • Lecture 25 – Cryptographic Hash Functions (cont.) Unlimited
  • Lecture 26 – Message Authentication Codes Unlimited
  • Lecture 27 – More Number Theoretic Results Unlimited
  • Lecture 28 – The RSA Cryptosystem Unlimited
  • Lecture 29 – Primality Testing Unlimited
  • Lecture 30 – Factoring Algorithms Unlimited
  • Lecture 31 – Some Comments on the Security of RSA Unlimited
  • Lecture 32 – Discrete Logarithm Problem (DLP) Unlimited
  • Lecture 33 – The Diffie-Hellman Problem and Security of ElGamal Systems Unlimited
  • Lecture 34 – An Introduction to Elliptic Curve Cryptography Unlimited
  • Lecture 35 – Application of Elliptic Curves to Cryptography Unlimited
  • Lecture 36 – Implementation of Elliptic Curve Cryptography Unlimited
  • Lecture 37 – Secret Sharing Schemes Unlimited
  • Lecture 38 – A Tutorial on Network Protocols Unlimited
  • Lecture 39 – System Security Unlimited
  • Lecture 40 – Firewalls and Intrusion Detection Systems Unlimited
  • Lecture 41 – Side Channel Analysis of Cryptographic Implementations Unlimited