2016-09-06

Cryptography and Network Security by D. Mukhopadhyay (IIT Kharagpur)

# click the upper-left icon to select videos from the playlist

source: nptelhrd    2012年5月17日
Computer - Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

01 Introduction 59:03
02 Overview on Modern Cryptography 58:23
03 Introduction to Number Theory 1:03:30
04 Probability and Information Theory 53:55
05 Classical Cryptosystems 57:39
06 Cryptanalysis of Classical Ciphers 51:54
07 Shannons Theory 44:46
08 Shannon's Theory (Contd) 48:28
09 Shannon's Theory (Contd) 53:49
10 Symmetric Key Ciphers 52:42
11 Block Cipher Standards (DES) 50:12
12 Block Cipher Standards (AES) 58:27
13 Block Cipher Standards (AES) (Contd.) 54:54
14 Linear Cryptanalysis 56:30
15 Differential Cryptanalysis 46:35
16 Few other Cryptanalytic Techniques 57:45
17 Overview on S-Box Design Principles 51:06
18 Modes of Operation of Block Ciphers 52:20
19 Stream Ciphers 48:35
20 Stream Ciphers (Contd...1) 55:02
21 Stream Ciphers (Contd...2) 47:08
22 Pseudorandomness 47:49
23 Cryptographic Hash Functions 49:38
24 Cryptographic Hash Functions (Contd...1) 50:34
25 Cryptographic Hash Functions (Contd...2) 49:06
26 Message Authentication Codes 51:52
27 More Number Theoretic Results 56:14
28 The RSA Cryptosystem 50:32
29 Primality Testing 50:33
30 Factoring Algorithms 1:00:17
31 Some Comments on the Security of RSA 41:19
32 Discrete Logarithm Problem (DLP) 58:37
33 The Diffie-Hellman Problem and Security of ElGamal Systems 57:51
34 An Introduction to Elliptic Curve Cryptography 58:49
35 Application of Elliptic Curves to Cryptography 55:56
36 Implementation of Elliptic Curve Cryptography 55:17
37 Secret Sharing Schemes 52:41
38 A Tutorial on Network Protocols 55:27
39 System Security 53:25
40 Firewalls and Intrusion Detection Systems 49:44
41 Side Channel Analysis of Cryptographic Implementations 48:21

No comments: