Module NameDownloadDescriptionDownload Size
Cryptography and Network SecurityQuestion & AnswerThis is questionnaire & Answer that covers after 40th lectures in the module and could be attempted after listening to 40th lectures.121 kb


New Assignments
Module NameDownload

Sl.No Chapter Name English
1IntroductionPDF unavailable
2Overview on Modern CryptographyPDF unavailable
3Introduction to Number TheoryPDF unavailable
4Probability and Information TheoryPDF unavailable
5Classical CryptosystemsPDF unavailable
6Cryptanalysis of Classical CiphersPDF unavailable
7Shannons TheoryPDF unavailable
8Shannons Theory (Contd...1)PDF unavailable
9Shannons Theory (Contd...2)PDF unavailable
10Symmetric Key CiphersPDF unavailable
11Block Cipher Standards (DES)PDF unavailable
12Block Cipher Standards (AES)PDF unavailable
13Block Cipher Standards (AES) (Contd.)PDF unavailable
14Linear CryptanalysisPDF unavailable
15Differential CryptanalysisPDF unavailable
16Few other Cryptanalytic TechniquesPDF unavailable
17Overview on S-Box Design PrinciplesPDF unavailable
18Modes of Operation of Block CiphersPDF unavailable
19Stream CiphersPDF unavailable
20Stream Ciphers (Contd...1)PDF unavailable
21Stream Ciphers (Contd...2)PDF unavailable
22PseudorandomnessPDF unavailable
23Cryptographic Hash FunctionsPDF unavailable
24Cryptographic Hash Functions (Contd...1)PDF unavailable
25Cryptographic Hash Functions (Contd...2)PDF unavailable
26Message Authentication CodesPDF unavailable
27More Number Theoretic ResultsPDF unavailable
28The RSA CryptosystemPDF unavailable
29Primality TestingPDF unavailable
30Factoring AlgorithmsPDF unavailable
31Some Comments on the Security of RSAPDF unavailable
32Discrete Logarithm Problem (DLP)PDF unavailable
33The Diffie-Hellman Problem and Security of ElGamal SystemsPDF unavailable
34An Introduction to Elliptic Curve CryptographyPDF unavailable
35Application of Elliptic Curves to CryptographyPDF unavailable
36Implementation of Elliptic Curve CryptographyPDF unavailable
37Secret Sharing SchemesPDF unavailable
38A Tutorial on Network ProtocolsPDF unavailable
39System SecurityPDF unavailable
40Firewalls and Intrusion Detection SystemsPDF unavailable
41Side Channel Analysis of Cryptographic ImplementationsPDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available