Modules / Lectures


New Assignments
Module NameDownload
noc19_cs28_Assignment1noc19_cs28_Assignment1
noc19_cs28_Assignment10noc19_cs28_Assignment10
noc19_cs28_Assignment11noc19_cs28_Assignment11
noc19_cs28_Assignment12noc19_cs28_Assignment12
noc19_cs28_Assignment2noc19_cs28_Assignment2
noc19_cs28_Assignment3noc19_cs28_Assignment3
noc19_cs28_Assignment4noc19_cs28_Assignment4
noc19_cs28_Assignment5noc19_cs28_Assignment5
noc19_cs28_Assignment6noc19_cs28_Assignment6
noc19_cs28_Assignment7noc19_cs28_Assignment7
noc19_cs28_Assignment8noc19_cs28_Assignment8
noc19_cs28_Assignment9noc19_cs28_Assignment9


Sl.No Chapter Name MP4 Download
1Lecture 01: Introduction to Cryptography.Download
2Lecture 02: Classical Cryptosystem.Download
3Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ).Download
4Lecture 04: Play Fair Cipher.Download
5Lecture 05: Block CipherDownload
6Lecture 6 : Data Encryption Standard (DES).Download
7Lecture 7 : DES (Contd.).Download
8Lecture 8 : Triple DES and Modes of Operation.Download
9Lecture 9 : Stream Cipher.Download
10Lecture 10 : Pseudorandom SequenceDownload
11Lecture 11 : LFSR Based StreamCipherDownload
12Lecture 12 : Mathematical BackgroundDownload
13Lecture 13 : Abstract Algebra (Contd.)Download
14Lecture 14 : Number TheoryDownload
15Lecture 15 : Number Theory (Contd.)Download
16Lecture 16 : Modular InverseDownload
17Lecture 17 : Extended Euclidean AlgorithmDownload
18Lecture 18 : Fermat's Little Theorem, Euler Phi - FunctionDownload
19Lecture 19 : Euler's theorem, Quadratic ResidueDownload
20Lecture 20 : Polynomial ArithmeticDownload
21Lecture 21 : Advanced Encryption Standard (AES)Download
22Lecture 22 : Advanced Encryption Standard (AES) (Contd.)Download
23Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.Download
24Lecture 24 : Knapsack Cryptosystem.Download
25Lecture 25 : RSA CryptosystemDownload
26Lecture 26: More on RSADownload
27Lecture 27: Primarily TestingDownload
28Lecture 28: ElGamal Cryptosystem.Download
29Lecture 29: Elliptic Curve over the RealsDownload
30Lecture 30: Elliptic curve Modulo a Prime.Download
31Lecture 31: Generalised ElGamal Public Key CryptosystemDownload
32Lecture 32: Chinese Remainder TheoremDownload
33Lecture 33: Rabin CryptosystemDownload
34Lecture 34: Legendre and Jacobi SymbolDownload
35Lecture 35: Jacobi Symbol (Contd.)Download
36Lecture 36: Message Authentication.Download
37Lecture 37: Digital Signature.Download
38Lecture 38: Key ManagementDownload
39Lecture 39: Key ExchangeDownload
40Lecture 40: Hash FunctionDownload
41Lecture 41: Universal HashingDownload
42Lecture 42: Cryptographic Hash FunctionDownload
43Lecture 43: Secure Hash Algorithm (SHA)Download
44Lecture 44: Digital Signature Standard (DSS)Download
45Lecture 45: More on Key Exchange ProtocolDownload
46Lecture 46: CryptoanalisisDownload
47Lecture 47: Memory Trade off AttackDownload
48Lecture 48:Differential CryptoanalysisDownload
49Lecture 49: More on Differential Cryptoanalysis Download
50Lecture 50: Linear Cryptoanalysis Download
51Lecture 51: Cryptoanalysis and Stream CipherDownload
52Lecture 52: Modern Stream CipherDownload
53Lecture 53: Shamir Secret SharingDownload
54Lecture 54: Identity Based Eneryption (IBE)Download
55Lecture 55: Attribute Based EncryptionDownload

Sl.No Chapter Name English
1Lecture 01: Introduction to Cryptography.Download
Verified
2Lecture 02: Classical Cryptosystem.Download
Verified
3Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ).Download
Verified
4Lecture 04: Play Fair Cipher.Download
Verified
5Lecture 05: Block CipherDownload
Verified
6Lecture 6 : Data Encryption Standard (DES).PDF unavailable
7Lecture 7 : DES (Contd.).PDF unavailable
8Lecture 8 : Triple DES and Modes of Operation.PDF unavailable
9Lecture 9 : Stream Cipher.PDF unavailable
10Lecture 10 : Pseudorandom SequencePDF unavailable
11Lecture 11 : LFSR Based StreamCipherPDF unavailable
12Lecture 12 : Mathematical BackgroundPDF unavailable
13Lecture 13 : Abstract Algebra (Contd.)PDF unavailable
14Lecture 14 : Number TheoryPDF unavailable
15Lecture 15 : Number Theory (Contd.)PDF unavailable
16Lecture 16 : Modular InversePDF unavailable
17Lecture 17 : Extended Euclidean AlgorithmPDF unavailable
18Lecture 18 : Fermat's Little Theorem, Euler Phi - FunctionPDF unavailable
19Lecture 19 : Euler's theorem, Quadratic ResiduePDF unavailable
20Lecture 20 : Polynomial ArithmeticPDF unavailable
21Lecture 21 : Advanced Encryption Standard (AES)PDF unavailable
22Lecture 22 : Advanced Encryption Standard (AES) (Contd.)PDF unavailable
23Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.PDF unavailable
24Lecture 24 : Knapsack Cryptosystem.PDF unavailable
25Lecture 25 : RSA CryptosystemPDF unavailable
26Lecture 26: More on RSAPDF unavailable
27Lecture 27: Primarily TestingPDF unavailable
28Lecture 28: ElGamal Cryptosystem.PDF unavailable
29Lecture 29: Elliptic Curve over the RealsPDF unavailable
30Lecture 30: Elliptic curve Modulo a Prime.PDF unavailable
31Lecture 31: Generalised ElGamal Public Key CryptosystemPDF unavailable
32Lecture 32: Chinese Remainder TheoremPDF unavailable
33Lecture 33: Rabin CryptosystemPDF unavailable
34Lecture 34: Legendre and Jacobi SymbolPDF unavailable
35Lecture 35: Jacobi Symbol (Contd.)PDF unavailable
36Lecture 36: Message Authentication.PDF unavailable
37Lecture 37: Digital Signature.PDF unavailable
38Lecture 38: Key ManagementPDF unavailable
39Lecture 39: Key ExchangePDF unavailable
40Lecture 40: Hash FunctionPDF unavailable
41Lecture 41: Universal HashingPDF unavailable
42Lecture 42: Cryptographic Hash FunctionPDF unavailable
43Lecture 43: Secure Hash Algorithm (SHA)PDF unavailable
44Lecture 44: Digital Signature Standard (DSS)PDF unavailable
45Lecture 45: More on Key Exchange ProtocolPDF unavailable
46Lecture 46: CryptoanalisisPDF unavailable
47Lecture 47: Memory Trade off AttackPDF unavailable
48Lecture 48:Differential CryptoanalysisPDF unavailable
49Lecture 49: More on Differential Cryptoanalysis PDF unavailable
50Lecture 50: Linear Cryptoanalysis PDF unavailable
51Lecture 51: Cryptoanalysis and Stream CipherPDF unavailable
52Lecture 52: Modern Stream CipherPDF unavailable
53Lecture 53: Shamir Secret SharingPDF unavailable
54Lecture 54: Identity Based Eneryption (IBE)PDF unavailable
55Lecture 55: Attribute Based EncryptionPDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available