Modules / Lectures


New Assignments
Module NameDownload
noc20_cs21_assigment_1noc20_cs21_assigment_1
noc20_cs21_assigment_10noc20_cs21_assigment_10
noc20_cs21_assigment_11noc20_cs21_assigment_11
noc20_cs21_assigment_12noc20_cs21_assigment_12
noc20_cs21_assigment_13noc20_cs21_assigment_13
noc20_cs21_assigment_2noc20_cs21_assigment_2
noc20_cs21_assigment_3noc20_cs21_assigment_3
noc20_cs21_assigment_4noc20_cs21_assigment_4
noc20_cs21_assigment_5noc20_cs21_assigment_5
noc20_cs21_assigment_6noc20_cs21_assigment_6
noc20_cs21_assigment_7noc20_cs21_assigment_7
noc20_cs21_assigment_8noc20_cs21_assigment_8
noc20_cs21_assigment_9noc20_cs21_assigment_9


Sl.No Chapter Name MP4 Download
1Lecture 01: Introduction to Cryptography.Download
2Lecture 02: Classical Cryptosystem.Download
3Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ).Download
4Lecture 04: Play Fair Cipher.Download
5Lecture 05: Block CipherDownload
6Lecture 6 : Data Encryption Standard (DES).Download
7Lecture 7 : DES (Contd.).Download
8Lecture 8 : Triple DES and Modes of Operation.Download
9Lecture 9 : Stream Cipher.Download
10Lecture 10 : Pseudorandom SequenceDownload
11Lecture 11 : LFSR Based StreamCipherDownload
12Lecture 12 : Mathematical BackgroundDownload
13Lecture 13 : Abstract Algebra (Contd.)Download
14Lecture 14 : Number TheoryDownload
15Lecture 15 : Number Theory (Contd.)Download
16Lecture 16 : Modular InverseDownload
17Lecture 17 : Extended Euclidean AlgorithmDownload
18Lecture 18 : Fermat's Little Theorem, Euler Phi - FunctionDownload
19Lecture 19 : Euler's theorem, Quadratic ResidueDownload
20Lecture 20 : Polynomial ArithmeticDownload
21Lecture 21 : Advanced Encryption Standard (AES)Download
22Lecture 22 : Advanced Encryption Standard (AES) (Contd.)Download
23Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.Download
24Lecture 24 : Knapsack Cryptosystem.Download
25Lecture 25 : RSA CryptosystemDownload
26Lecture 26: More on RSADownload
27Lecture 27: Primarily TestingDownload
28Lecture 28: ElGamal Cryptosystem.Download
29Lecture 29: Elliptic Curve over the RealsDownload
30Lecture 30: Elliptic curve Modulo a Prime.Download
31Lecture 31: Generalised ElGamal Public Key CryptosystemDownload
32Lecture 32: Chinese Remainder TheoremDownload
33Lecture 33: Rabin CryptosystemDownload
34Lecture 34: Legendre and Jacobi SymbolDownload
35Lecture 35: Jacobi Symbol (Contd.)Download
36Lecture 36: Message Authentication.Download
37Lecture 37: Digital Signature.Download
38Lecture 38: Key ManagementDownload
39Lecture 39: Key ExchangeDownload
40Lecture 40: Hash FunctionDownload
41Lecture 41: Universal HashingDownload
42Lecture 42: Cryptographic Hash FunctionDownload
43Lecture 43: Secure Hash Algorithm (SHA)Download
44Lecture 44: Digital Signature Standard (DSS)Download
45Lecture 45: More on Key Exchange ProtocolDownload
46Lecture 46: CryptoanalisisDownload
47Lecture 47: Memory Trade off AttackDownload
48Lecture 48:Differential CryptoanalysisDownload
49Lecture 49: More on Differential Cryptoanalysis Download
50Lecture 50: Linear Cryptoanalysis Download
51Lecture 51: Cryptoanalysis and Stream CipherDownload
52Lecture 52: Modern Stream CipherDownload
53Lecture 53: Shamir Secret SharingDownload
54Lecture 54: Identity Based Eneryption (IBE)Download
55Lecture 55: Attribute Based EncryptionDownload
56Lecture 56: Functional Encryption (Introduction)Download
57Lecture 57: Discrete Logarithm Problem (DLP)Download
58Lecture 58: Implementation AttacksDownload
59Lecture 59: The Secure Sockets layer (SSL)Download
60Lecture 60: Pretty Good Privacy (PGP)Download

Sl.No Chapter Name English
1Lecture 01: Introduction to Cryptography.Download
Verified
2Lecture 02: Classical Cryptosystem.Download
Verified
3Lecture 03: Cryptanalysis on Substitution Cipher (Frequency Analysis ).Download
Verified
4Lecture 04: Play Fair Cipher.Download
Verified
5Lecture 05: Block CipherDownload
Verified
6Lecture 6 : Data Encryption Standard (DES).Download
Verified
7Lecture 7 : DES (Contd.).Download
Verified
8Lecture 8 : Triple DES and Modes of Operation.Download
Verified
9Lecture 9 : Stream Cipher.Download
Verified
10Lecture 10 : Pseudorandom SequenceDownload
Verified
11Lecture 11 : LFSR Based StreamCipherDownload
Verified
12Lecture 12 : Mathematical BackgroundDownload
Verified
13Lecture 13 : Abstract Algebra (Contd.)Download
Verified
14Lecture 14 : Number TheoryDownload
Verified
15Lecture 15 : Number Theory (Contd.)Download
Verified
16Lecture 16 : Modular InverseDownload
Verified
17Lecture 17 : Extended Euclidean AlgorithmDownload
Verified
18Lecture 18 : Fermat's Little Theorem, Euler Phi - FunctionDownload
Verified
19Lecture 19 : Euler's theorem, Quadratic ResidueDownload
Verified
20Lecture 20 : Polynomial ArithmeticDownload
Verified
21Lecture 21 : Advanced Encryption Standard (AES)PDF unavailable
22Lecture 22 : Advanced Encryption Standard (AES) (Contd.)PDF unavailable
23Lecture 23 : Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.Download
Verified
24Lecture 24 : Knapsack Cryptosystem.Download
Verified
25Lecture 25 : RSA CryptosystemDownload
Verified
26Lecture 26: More on RSADownload
Verified
27Lecture 27: Primarily TestingDownload
Verified
28Lecture 28: ElGamal Cryptosystem.PDF unavailable
29Lecture 29: Elliptic Curve over the RealsPDF unavailable
30Lecture 30: Elliptic curve Modulo a Prime.PDF unavailable
31Lecture 31: Generalised ElGamal Public Key CryptosystemPDF unavailable
32Lecture 32: Chinese Remainder TheoremPDF unavailable
33Lecture 33: Rabin CryptosystemPDF unavailable
34Lecture 34: Legendre and Jacobi SymbolPDF unavailable
35Lecture 35: Jacobi Symbol (Contd.)PDF unavailable
36Lecture 36: Message Authentication.PDF unavailable
37Lecture 37: Digital Signature.PDF unavailable
38Lecture 38: Key ManagementPDF unavailable
39Lecture 39: Key ExchangePDF unavailable
40Lecture 40: Hash FunctionPDF unavailable
41Lecture 41: Universal HashingPDF unavailable
42Lecture 42: Cryptographic Hash FunctionPDF unavailable
43Lecture 43: Secure Hash Algorithm (SHA)PDF unavailable
44Lecture 44: Digital Signature Standard (DSS)PDF unavailable
45Lecture 45: More on Key Exchange ProtocolPDF unavailable
46Lecture 46: CryptoanalisisPDF unavailable
47Lecture 47: Memory Trade off AttackPDF unavailable
48Lecture 48:Differential CryptoanalysisPDF unavailable
49Lecture 49: More on Differential Cryptoanalysis PDF unavailable
50Lecture 50: Linear Cryptoanalysis PDF unavailable
51Lecture 51: Cryptoanalysis and Stream CipherPDF unavailable
52Lecture 52: Modern Stream CipherPDF unavailable
53Lecture 53: Shamir Secret SharingPDF unavailable
54Lecture 54: Identity Based Eneryption (IBE)PDF unavailable
55Lecture 55: Attribute Based EncryptionPDF unavailable
56Lecture 56: Functional Encryption (Introduction)PDF unavailable
57Lecture 57: Discrete Logarithm Problem (DLP)PDF unavailable
58Lecture 58: Implementation AttacksPDF unavailable
59Lecture 59: The Secure Sockets layer (SSL)PDF unavailable
60Lecture 60: Pretty Good Privacy (PGP)PDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available