Modules / Lectures

Sl.No | Chapter Name | English |
---|---|---|

1 | Lecture 01-Introduction Caeser cipher | Download Verified |

2 | Lecture 02- Modular arithmetic, shift cipher | Download Verified |

3 | Lecture 03- Affine Cipher, Vigenere Cipher | Download Verified |

4 | Lecture 04- Prefect secrecy, Application of Shift Cipher | Download Verified |

5 | Lecture 05- Problem Discussion on Affine cipher and Perfect Secrecy | Download Verified |

6 | Product Cipher, Block Cipher, Modes of Operation for Block Cipher | Download Verified |

7 | Substitution Permutation network, Fiestel Cipher | Download Verified |

8 | S-Box Theory | Download Verified |

9 | Cryptanalysis and its Variants, Linear Attack | Download Verified |

10 | Problem Discussion | Download Verified |

11 | Public Key Cryptology Introduction RSA Cryptosystem | Download Verified |

12 | Complexity analysis of Euclidian Algorithm and RSA Cryptosystem square and multiply algorithm | Download Verified |

13 | Primality testing: Miler-Rabin Algorithm, Legendre Symbol and Jacobi Symbol | Download Verified |

14 | Efficien Computation of Jacobi Symbol Primality Testing:Solovay-Stassen Algorithm | Download Verified |

15 | Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem | Download Verified |

16 | Cryptographic hash function: Introduction | Download Verified |

17 | Random Oracle model, Security of hash functions | Download Verified |

18 | Randomized Algorithm and its application on Preimage resistance and collision resistance | Download Verified |

19 | Iterated Hash Functions | Download Verified |

20 | Problem Discussionn | Download Verified |

Sl.No | Language | Book link |
---|---|---|

1 | English | Not Available |

2 | Bengali | Not Available |

3 | Gujarati | Not Available |

4 | Hindi | Not Available |

5 | Kannada | Not Available |

6 | Malayalam | Not Available |

7 | Marathi | Not Available |

8 | Tamil | Not Available |

9 | Telugu | Not Available |