1
Internetwork Security. Instructor: Prof. Sourav Mukhopadhyay, Department of Mathematics, IIT Kharagpur.
FREE
This course includes
Hours of videos
1666 years, 6 months
Units & Quizzes
60
Unlimited Lifetime access
Access on mobile app
Certificate of Completion
The aim of this course is to introduce the student to the areas of cryptography and cryptanalysis. This course develops a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. Our aim is to develop a workable knowledge of the mathematics used in cryptology in this course. The course emphasizes to give a basic understanding of previous attacks on cryptosystems with the aim of preventing future attacks. (from nptel.ac.in)
Course Currilcum
- Lecture 01 – Introduction to Cryptography Unlimited
- Lecture 02 – Classical Cryptosystem Unlimited
- Lecture 03 – Cryptanalysis on Substitution Cipher (Frequency Analysis) Unlimited
- Lecture 04 – Polyalphabetic Cipher, Playfair Cipher Unlimited
- Lecture 05 – Introduction to Block Cipher, Substitution and Permutation Network Unlimited
- Lecture 06 – Data Encryption Standard (DES) Unlimited
- Lecture 07 – DES (cont.) Unlimited
- Lecture 08 – Triple DES and Modes of Operation Unlimited
- Lecture 09 – Stream Cipher Unlimited
- Lecture 10 – Pseudorandom Sequence Unlimited
- Lecture 11 – LFSR based Stream Cipher Unlimited
- Lecture 12 – Mathematical Background: Abstract Algebra, Group Unlimited
- Lecture 13 – Abstract Algebra: Ring, Field Unlimited
- Lecture 14 – Number Theory Unlimited
- Lecture 15 – Number Theory: Euclidean Algorithm, Modular Arithmetic, Congruence Relation Unlimited
- Lecture 16 – Modular Inverse Unlimited
- Lecture 17 – Extended Euclidean Algorithm Unlimited
- Lecture 18 – Fermat’s Little Theorem, Euler Pi-Function Unlimited
- Lecture 19 – Euler’s Theorem, Quadratic Residue Unlimited
- Lecture 20 – Polynomial Arithmetic Unlimited
- Lecture 21 – Advanced Encryption Standard (AES) Unlimited
- Lecture 22 – AES: AES Sub Byte, Min Column, Key Scheduling Algorithm Unlimited
- Lecture 23 – Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange Unlimited
- Lecture 24 – Knapsack Cryptosystem Unlimited
- Lecture 25 – RSA Cryptosystem Unlimited
- Lecture 26 – More on RSA Unlimited
- Lecture 27 – Primality Testing: Euler Test, Miller-Rabin Test, AKS Algorithms Unlimited
- Lecture 28 – ElGamal Cryptosystem Unlimited
- Lecture 29 – Elliptic Curve over the Reals Unlimited
- Lecture 30 – Elliptic Curve Modulo a Prime Unlimited
- Lecture 31 – Generalised ElGamal Public Key Cryptosystem Unlimited
- Lecture 32 – Chinese Remainder Theorem Unlimited
- Lecture 33 – Rabin Cryptosystem Unlimited
- Lecture 34 – Legendre and Jacobi Symbol Unlimited
- Lecture 35 – Jacobi Symbol (cont.) Unlimited
- Lecture 36 – Message Authentication Unlimited
- Lecture 37 – Digital Signature Scheme: RSA Signature Scheme, ElGamal Signature Scheme Unlimited
- Lecture 38 – Key Management Unlimited
- Lecture 39 – Key Exchange Unlimited
- Lecture 40 – Hash Function Unlimited
- Lecture 41 – Universal Hashing Unlimited
- Lecture 42 – Cryptographic Hash Function Unlimited
- Lecture 43 – Secure Hash Algorithm (SHA) Unlimited
- Lecture 44 – Digital Signature Standard (DSS) Unlimited
- Lecture 45 – More on Key Exchange Protocol Unlimited
- Lecture 46 – Cryptanalysis Unlimited
- Lecture 47 – Time-Memory Trade-off Attack Unlimited
- Lecture 48 – Differential Cryptanalysis Unlimited
- Lecture 49 – More on Differential Cryptanalysis Unlimited
- Lecture 50 – Linear Cryptanalysis Unlimited
- Lecture 51 – Cryptanalysis on Stream Cipher Unlimited
- Lecture 52 – Modern Stream Ciphers Unlimited
- Lecture 53 – Shamir’s Secret Sharing and BE (Broadcast Encryption) Unlimited
- Lecture 54 – Identity based Encryption (IBE) Unlimited
- Lecture 55 – Attribute based Encryption (ABE) Unlimited
- Lecture 56 – Functional Encryption Unlimited
- Lecture 57 – Solving Discrete Log Problem Unlimited
- Lecture 58 – Implementation Attacks: Side Channel Attack, Power Analysis, Timing Attack Unlimited
- Lecture 59 – The Secure Sockets Layer Unlimited
- Lecture 60 – Pretty Good Privacy, Email security Unlimited