1
Introduction to Cryptology. Instructor: Dr. Sugata Gangopadhyay, Department of Computer Science and Engineering, IIT Roorkee.
FREE
This course includes
Hours of videos
555 years, 6 months
Units & Quizzes
20
Unlimited Lifetime access
Access on mobile app
Certificate of Completion
Cryptology is employed to communicate securely, authenticate messages and sign digitally. This four-week course "Introduction to Cryptology" is designed for both computer science and mathematics students, touching upon the most important ideas and techniques of the present day cryptology. All the pre-requisite topics are revised during the lectures making this course self-contained and accessible to a wider audience. It is hoped that this course will prepare interested students for a more extensive course on Information Security (from nptel.ac.in)
Course Currilcum
- Lecture 01 – Introduction, Caesar Cipher Unlimited
- Lecture 02 – Modular Arithmetic, Shift Cipher Unlimited
- Lecture 03 – Affine Cipher, Vigenere Cipher Unlimited
- Lecture 04 – Perfect Secrecy, Application of Shift Cipher Unlimited
- Lecture 05 – Problem Discussion on Affine Cipher and Perfect Secrecy Unlimited
- Lecture 06 – Product Cipher, Block Cipher, Modes of Operation for Block Cipher Unlimited
- Lecture 07 – Substitution Permutation Network, Feistel Cipher Unlimited
- Lecture 08 – S-Box Theory Unlimited
- Lecture 09 – Cryptanalysis and its Variants, Linear Attack Unlimited
- Lecture 10 – Problem Discussion Unlimited
- Lecture 11 – Public Key Cryptology Introduction, RSA Cryptosystem Unlimited
- Lecture 12 – Complexity Analysis of Euclidean Algorithm and RSA Cryptosystem Square Unlimited
- Lecture 13 – Primality Testing: Miller-Rabin Algorithm, Legendre Symbol and Jacobi Symbol Unlimited
- Lecture 14 – Efficient Computation of Jacobi Symbol Primality Testing Unlimited
- Lecture 15 – Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem Unlimited
- Lecture 16 – Cryptographic Hash Function: Introduction Unlimited
- Lecture 17 – Random Oracle Model, Security of Hash Functions Unlimited
- Lecture 18 – Randomized Algorithm and its Application on Preimage Resistance and … Unlimited
- Lecture 19 – Iterated Hash Functions Unlimited
- Lecture 20 – Problem Discussion Unlimited