Module Name | Download |
---|---|
noc20_cs21_assigment_1 | noc20_cs21_assigment_1 |
noc20_cs21_assigment_10 | noc20_cs21_assigment_10 |
noc20_cs21_assigment_11 | noc20_cs21_assigment_11 |
noc20_cs21_assigment_12 | noc20_cs21_assigment_12 |
noc20_cs21_assigment_13 | noc20_cs21_assigment_13 |
noc20_cs21_assigment_2 | noc20_cs21_assigment_2 |
noc20_cs21_assigment_3 | noc20_cs21_assigment_3 |
noc20_cs21_assigment_4 | noc20_cs21_assigment_4 |
noc20_cs21_assigment_5 | noc20_cs21_assigment_5 |
noc20_cs21_assigment_6 | noc20_cs21_assigment_6 |
noc20_cs21_assigment_7 | noc20_cs21_assigment_7 |
noc20_cs21_assigment_8 | noc20_cs21_assigment_8 |
noc20_cs21_assigment_9 | noc20_cs21_assigment_9 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Lecture 01: Introduction to Cryptography. | Download |
2 | Lecture 02: Classical Cryptosystem. | Download |
3 | Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ). | Download |
4 | Lecture 04: Play Fair Cipher. | Download |
5 | Lecture 05: Block Cipher | Download |
6 | Lecture 6 : Data Encryption Standard (DES). | Download |
7 | Lecture 7 : DES (Contd.). | Download |
8 | Lecture 8 : Triple DES and Modes of Operation. | Download |
9 | Lecture 9 : Stream Cipher. | Download |
10 | Lecture 10 : Pseudorandom Sequence | Download |
11 | Lecture 11 : LFSR Based StreamCipher | Download |
12 | Lecture 12 : Mathematical Background | Download |
13 | Lecture 13 : Abstract Algebra (Contd.) | Download |
14 | Lecture 14 : Number Theory | Download |
15 | Lecture 15 : Number Theory (Contd.) | Download |
16 | Lecture 16 : Modular Inverse | Download |
17 | Lecture 17 : Extended Euclidean Algorithm | Download |
18 | Lecture 18 : Fermat's Little Theorem, Euler Phi - Function | Download |
19 | Lecture 19 : Euler's theorem, Quadratic Residue | Download |
20 | Lecture 20 : Polynomial Arithmetic | Download |
21 | Lecture 21 : Advanced Encryption Standard (AES) | Download |
22 | Lecture 22 : Advanced Encryption Standard (AES) (Contd.) | Download |
23 | Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange. | Download |
24 | Lecture 24 : Knapsack Cryptosystem. | Download |
25 | Lecture 25 : RSA Cryptosystem | Download |
26 | Lecture 26: More on RSA | Download |
27 | Lecture 27: Primarily Testing | Download |
28 | Lecture 28: ElGamal Cryptosystem. | Download |
29 | Lecture 29: Elliptic Curve over the Reals | Download |
30 | Lecture 30: Elliptic curve Modulo a Prime. | Download |
31 | Lecture 31: Generalised ElGamal Public Key Cryptosystem | Download |
32 | Lecture 32: Chinese Remainder Theorem | Download |
33 | Lecture 33: Rabin Cryptosystem | Download |
34 | Lecture 34: Legendre and Jacobi Symbol | Download |
35 | Lecture 35: Jacobi Symbol (Contd.) | Download |
36 | Lecture 36: Message Authentication. | Download |
37 | Lecture 37: Digital Signature. | Download |
38 | Lecture 38: Key Management | Download |
39 | Lecture 39: Key Exchange | Download |
40 | Lecture 40: Hash Function | Download |
41 | Lecture 41: Universal Hashing | Download |
42 | Lecture 42: Cryptographic Hash Function | Download |
43 | Lecture 43: Secure Hash Algorithm (SHA) | Download |
44 | Lecture 44: Digital Signature Standard (DSS) | Download |
45 | Lecture 45: More on Key Exchange Protocol | Download |
46 | Lecture 46: Cryptoanalisis | Download |
47 | Lecture 47: Memory Trade off Attack | Download |
48 | Lecture 48:Differential Cryptoanalysis | Download |
49 | Lecture 49: More on Differential Cryptoanalysis | Download |
50 | Lecture 50: Linear Cryptoanalysis | Download |
51 | Lecture 51: Cryptoanalysis and Stream Cipher | Download |
52 | Lecture 52: Modern Stream Cipher | Download |
53 | Lecture 53: Shamir Secret Sharing | Download |
54 | Lecture 54: Identity Based Eneryption (IBE) | Download |
55 | Lecture 55: Attribute Based Encryption | Download |
56 | Lecture 56: Functional Encryption (Introduction) | Download |
57 | Lecture 57: Discrete Logarithm Problem (DLP) | Download |
58 | Lecture 58: Implementation Attacks | Download |
59 | Lecture 59: The Secure Sockets layer (SSL) | Download |
60 | Lecture 60: Pretty Good Privacy (PGP) | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Lecture 01: Introduction to Cryptography. | Download Verified |
2 | Lecture 02: Classical Cryptosystem. | Download Verified |
3 | Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ). | Download Verified |
4 | Lecture 04: Play Fair Cipher. | Download Verified |
5 | Lecture 05: Block Cipher | Download Verified |
6 | Lecture 6 : Data Encryption Standard (DES). | Download Verified |
7 | Lecture 7 : DES (Contd.). | Download Verified |
8 | Lecture 8 : Triple DES and Modes of Operation. | Download Verified |
9 | Lecture 9 : Stream Cipher. | Download Verified |
10 | Lecture 10 : Pseudorandom Sequence | Download Verified |
11 | Lecture 11 : LFSR Based StreamCipher | Download Verified |
12 | Lecture 12 : Mathematical Background | Download Verified |
13 | Lecture 13 : Abstract Algebra (Contd.) | Download Verified |
14 | Lecture 14 : Number Theory | Download Verified |
15 | Lecture 15 : Number Theory (Contd.) | Download Verified |
16 | Lecture 16 : Modular Inverse | Download Verified |
17 | Lecture 17 : Extended Euclidean Algorithm | Download Verified |
18 | Lecture 18 : Fermat's Little Theorem, Euler Phi - Function | Download Verified |
19 | Lecture 19 : Euler's theorem, Quadratic Residue | Download Verified |
20 | Lecture 20 : Polynomial Arithmetic | Download Verified |
21 | Lecture 21 : Advanced Encryption Standard (AES) | PDF unavailable |
22 | Lecture 22 : Advanced Encryption Standard (AES) (Contd.) | PDF unavailable |
23 | Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange. | Download Verified |
24 | Lecture 24 : Knapsack Cryptosystem. | Download Verified |
25 | Lecture 25 : RSA Cryptosystem | Download Verified |
26 | Lecture 26: More on RSA | Download Verified |
27 | Lecture 27: Primarily Testing | Download Verified |
28 | Lecture 28: ElGamal Cryptosystem. | PDF unavailable |
29 | Lecture 29: Elliptic Curve over the Reals | PDF unavailable |
30 | Lecture 30: Elliptic curve Modulo a Prime. | PDF unavailable |
31 | Lecture 31: Generalised ElGamal Public Key Cryptosystem | PDF unavailable |
32 | Lecture 32: Chinese Remainder Theorem | PDF unavailable |
33 | Lecture 33: Rabin Cryptosystem | PDF unavailable |
34 | Lecture 34: Legendre and Jacobi Symbol | PDF unavailable |
35 | Lecture 35: Jacobi Symbol (Contd.) | PDF unavailable |
36 | Lecture 36: Message Authentication. | PDF unavailable |
37 | Lecture 37: Digital Signature. | PDF unavailable |
38 | Lecture 38: Key Management | PDF unavailable |
39 | Lecture 39: Key Exchange | PDF unavailable |
40 | Lecture 40: Hash Function | PDF unavailable |
41 | Lecture 41: Universal Hashing | PDF unavailable |
42 | Lecture 42: Cryptographic Hash Function | PDF unavailable |
43 | Lecture 43: Secure Hash Algorithm (SHA) | PDF unavailable |
44 | Lecture 44: Digital Signature Standard (DSS) | PDF unavailable |
45 | Lecture 45: More on Key Exchange Protocol | PDF unavailable |
46 | Lecture 46: Cryptoanalisis | PDF unavailable |
47 | Lecture 47: Memory Trade off Attack | PDF unavailable |
48 | Lecture 48:Differential Cryptoanalysis | PDF unavailable |
49 | Lecture 49: More on Differential Cryptoanalysis | PDF unavailable |
50 | Lecture 50: Linear Cryptoanalysis | PDF unavailable |
51 | Lecture 51: Cryptoanalysis and Stream Cipher | PDF unavailable |
52 | Lecture 52: Modern Stream Cipher | PDF unavailable |
53 | Lecture 53: Shamir Secret Sharing | PDF unavailable |
54 | Lecture 54: Identity Based Eneryption (IBE) | PDF unavailable |
55 | Lecture 55: Attribute Based Encryption | PDF unavailable |
56 | Lecture 56: Functional Encryption (Introduction) | PDF unavailable |
57 | Lecture 57: Discrete Logarithm Problem (DLP) | PDF unavailable |
58 | Lecture 58: Implementation Attacks | PDF unavailable |
59 | Lecture 59: The Secure Sockets layer (SSL) | PDF unavailable |
60 | Lecture 60: Pretty Good Privacy (PGP) | PDF unavailable |
Sl.No | Language | Book link |
---|---|---|
1 | English | Not Available |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |