1

Introduction to Cryptology. Instructor: Dr. Sugata Gangopadhyay, Department of Computer Science and Engineering, IIT Roorkee.

FREE
This course includes
Hours of videos

555 years, 6 months

Units & Quizzes

20

Unlimited Lifetime access
Access on mobile app
Certificate of Completion

Cryptology is employed to communicate securely, authenticate messages and sign digitally. This four-week course "Introduction to Cryptology" is designed for both computer science and mathematics students, touching upon the most important ideas and techniques of the present day cryptology. All the pre-requisite topics are revised during the lectures making this course self-contained and accessible to a wider audience. It is hoped that this course will prepare interested students for a more extensive course on Information Security (from nptel.ac.in)

Course Currilcum

  • Lecture 01 – Introduction, Caesar Cipher Unlimited
  • Lecture 02 – Modular Arithmetic, Shift Cipher Unlimited
  • Lecture 03 – Affine Cipher, Vigenere Cipher Unlimited
  • Lecture 04 – Perfect Secrecy, Application of Shift Cipher Unlimited
  • Lecture 05 – Problem Discussion on Affine Cipher and Perfect Secrecy Unlimited
  • Lecture 06 – Product Cipher, Block Cipher, Modes of Operation for Block Cipher Unlimited
  • Lecture 07 – Substitution Permutation Network, Feistel Cipher Unlimited
  • Lecture 08 – S-Box Theory Unlimited
  • Lecture 09 – Cryptanalysis and its Variants, Linear Attack Unlimited
  • Lecture 10 – Problem Discussion Unlimited
  • Lecture 11 – Public Key Cryptology Introduction, RSA Cryptosystem Unlimited
  • Lecture 12 – Complexity Analysis of Euclidean Algorithm and RSA Cryptosystem Square Unlimited
  • Lecture 13 – Primality Testing: Miller-Rabin Algorithm, Legendre Symbol and Jacobi Symbol Unlimited
  • Lecture 14 – Efficient Computation of Jacobi Symbol Primality Testing Unlimited
  • Lecture 15 – Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem Unlimited
  • Lecture 16 – Cryptographic Hash Function: Introduction Unlimited
  • Lecture 17 – Random Oracle Model, Security of Hash Functions Unlimited
  • Lecture 18 – Randomized Algorithm and its Application on Preimage Resistance and … Unlimited
  • Lecture 19 – Iterated Hash Functions Unlimited
  • Lecture 20 – Problem Discussion Unlimited