Created by:

Profile Photo

Last updated:

September 25, 2023


Unlimited Duration


This course includes:

Unlimited Duration

Badge on Completion

Certificate of completion

Unlimited Duration


Introduction to Cryptology. Instructor: Dr. Sugata Gangopadhyay, Department of Computer Science and Engineering, IIT Roorkee.

Cryptology is employed to communicate securely, authenticate messages and sign digitally. This four-week course "Introduction to Cryptology" is designed for both computer science and mathematics students, touching upon the most important ideas and techniques of the present day cryptology. All the pre-requisite topics are revised during the lectures making this course self-contained and accessible to a wider audience. It is hoped that this course will prepare interested students for a more extensive course on Information Security (from nptel.ac.in)

Course Curriculum

  • Lecture 01 – Introduction, Caesar Cipher Unlimited
  • Lecture 02 – Modular Arithmetic, Shift Cipher Unlimited
  • Lecture 03 – Affine Cipher, Vigenere Cipher Unlimited
  • Lecture 04 – Perfect Secrecy, Application of Shift Cipher Unlimited
  • Lecture 05 – Problem Discussion on Affine Cipher and Perfect Secrecy Unlimited
  • Lecture 06 – Product Cipher, Block Cipher, Modes of Operation for Block Cipher Unlimited
  • Lecture 07 – Substitution Permutation Network, Feistel Cipher Unlimited
  • Lecture 08 – S-Box Theory Unlimited
  • Lecture 09 – Cryptanalysis and its Variants, Linear Attack Unlimited
  • Lecture 10 – Problem Discussion Unlimited
  • Lecture 11 – Public Key Cryptology Introduction, RSA Cryptosystem Unlimited
  • Lecture 12 – Complexity Analysis of Euclidean Algorithm and RSA Cryptosystem Square Unlimited
  • Lecture 13 – Primality Testing: Miller-Rabin Algorithm, Legendre Symbol and Jacobi Symbol Unlimited
  • Lecture 14 – Efficient Computation of Jacobi Symbol Primality Testing Unlimited
  • Lecture 15 – Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem Unlimited
  • Lecture 16 – Cryptographic Hash Function: Introduction Unlimited
  • Lecture 17 – Random Oracle Model, Security of Hash Functions Unlimited
  • Lecture 18 – Randomized Algorithm and its Application on Preimage Resistance and … Unlimited
  • Lecture 19 – Iterated Hash Functions Unlimited
  • Lecture 20 – Problem Discussion Unlimited

About the instructor

5 5

Instructor Rating







Profile Photo
We are an educational and skills marketplace to accommodate the needs of skills enhancement and free equal education across the globe to the millions. We are bringing courses and trainings every single day for our users. We welcome everyone woth all ages, all background to learn. There is so much available to learn and deliver to the people.