Modules / Lectures

Module Name | Download | Description | Download Size |
---|---|---|---|

Unit-1 | Assignment & Solution | Assignment & Solution | 311 kb |

Unit-1 | Week1 Assignmnt questions | Week1 Assignmnt questions | 282 kb |

Unit-1 | Week 1:Assignment Question | Week 1:Assignment Question | 265 kb |

Unit-1 | Week 1:Assignment Solution | Week 1:Assignment Solution | 3300 kb |

Unit-2 | Assignment & Solution | Assignment & Solution | 226 kb |

Unit-2 | Week2 Assignmnt questions | Week2 Assignmnt questions | 260 kb |

Unit-2 | Week 2:Assignment Question | Week 2:Assignment Question | 242 kb |

Unit-2 | Week 2:Assignment Solution | Week 2:Assignment Solution | 715 kb |

Unit-3 | Week3 Assignmnt questions | Week3 Assignmnt questions | 240 kb |

Unit-3 | Assignment & Solution | Assignment & Solution | 204 kb |

Unit-3 | Week 3:Assignment Question | Week 3:Assignment Question | 209 kb |

Unit-3 | Week 3:Assignment Solution | Week 3:Assignment Solution | 624 kb |

Unit-4 | Week4 Assignmnt questions | Week4 Assignmnt questions | 245 kb |

Unit-4 | Assignment & Solution | Assignment & Solution | 198 kb |

Unit-4 | Week 4:Assignment Question | Week 4:Assignment Question | 227 kb |

Unit-4 | Week 4:Assignment Solution | Week 4:Assignment Solution | 555 kb |

Sl.No | Chapter Name | English |
---|---|---|

1 | Lecture 01-Introduction Caeser cipher | Download Verified |

2 | Lecture 02- Modular arithmetic, shift cipher | Download Verified |

3 | Lecture 03- Affine Cipher, Vigenere Cipher | Download Verified |

4 | Lecture 04- Prefect secrecy, Application of Shift Cipher | Download Verified |

5 | Lecture 05- Problem Discussion on Affine cipher and Perfect Secrecy | Download Verified |

6 | Product Cipher, Block Cipher, Modes of Operation for Block Cipher | Download Verified |

7 | Substitution Permutation network, Fiestel Cipher | Download Verified |

8 | S-Box Theory | Download Verified |

9 | Cryptanalysis and its Variants, Linear Attack | Download Verified |

10 | Problem Discussion | Download Verified |

11 | Public Key Cryptology Introduction RSA Cryptosystem | Download Verified |

12 | Complexity analysis of Euclidian Algorithm and RSA Cryptosystem square and multiply algorithm | Download Verified |

13 | Primality testing: Miler-Rabin Algorithm, Legendre Symbol and Jacobi Symbol | Download Verified |

14 | Efficien Computation of Jacobi Symbol Primality Testing:Solovay-Stassen Algorithm | Download Verified |

15 | Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem | Download Verified |

16 | Cryptographic hash function: Introduction | Download Verified |

17 | Random Oracle model, Security of hash functions | Download Verified |

18 | Randomized Algorithm and its application on Preimage resistance and collision resistance | Download Verified |

19 | Iterated Hash Functions | Download Verified |

20 | Problem Discussionn | Download Verified |

Sl.No | Language | Book link |
---|---|---|

1 | English | Not Available |

2 | Bengali | Not Available |

3 | Gujarati | Not Available |

4 | Hindi | Not Available |

5 | Kannada | Not Available |

6 | Malayalam | Not Available |

7 | Marathi | Not Available |

8 | Tamil | Not Available |

9 | Telugu | Not Available |