Cryptography and Network Security Part 4/5 | WIlliam Stallings |Secure communication - S8 EC, CS,KTU
BASED ON WILLIAM STALLINGS TEXTBOOK
PART1: Introduction and Classic Encryption Techniques
OSI security architecture, Security attacks – Passive attacks, Active attacks, Security services- Authentication, Access Control, Data Confidentiality, Data integrity, Nonrepudiation, Availability service. Model for network security. Symmetric cipher model, Cryptography, Cryptoanalysis, Substitution techniques- Hill Cipher, One time pad,
Transposition Techniques
PART 2: Finite Fields Groups,Rings and Fields, Modular arithmetic, Euclidian algorithm, Finite Fields of the form GF(p), Polynomial arithmetic
PART 3: Block Ciphers. Data Encryption Standard, AES Cipher
Block Cipher Principles – Stream Ciphers and Block Ciphers, Feistel Cipher, Feistel Decryption algorithm, The Data encryption standard, DES Decryption - Avalanche effect, The AES Cipher, substitute bytes transformation, Shift row transformation, Mix Column transformation
PART 4: Public Key Cryptography, RSA and Key Management
Principles of public key cryptosystems-Public key cryptosystems, Application for Public key cryptosystem requirements, Fermat’s theorem, Euler’s Totient Function, Euler’s theorem, RSA algorithm, Key management, Distribution of public keys, Publicly available directory,
Public key authority, public key certificates, Distribution of secret keys using public key cryptography
PART 5: Message Authentication and Hash Function Authentication requirements, Authentication functions- Message Encryption, Public Key
Encryption, Message Authentication Code, Hash function
Text Book
1. William Stallings, Cryptography and Network security: principles and practice", 4th Edition, Prentice Hall of India, New Delhi, 2006
Видео Cryptography and Network Security Part 4/5 | WIlliam Stallings |Secure communication - S8 EC, CS,KTU канала bushara abdulrahim
PART1: Introduction and Classic Encryption Techniques
OSI security architecture, Security attacks – Passive attacks, Active attacks, Security services- Authentication, Access Control, Data Confidentiality, Data integrity, Nonrepudiation, Availability service. Model for network security. Symmetric cipher model, Cryptography, Cryptoanalysis, Substitution techniques- Hill Cipher, One time pad,
Transposition Techniques
PART 2: Finite Fields Groups,Rings and Fields, Modular arithmetic, Euclidian algorithm, Finite Fields of the form GF(p), Polynomial arithmetic
PART 3: Block Ciphers. Data Encryption Standard, AES Cipher
Block Cipher Principles – Stream Ciphers and Block Ciphers, Feistel Cipher, Feistel Decryption algorithm, The Data encryption standard, DES Decryption - Avalanche effect, The AES Cipher, substitute bytes transformation, Shift row transformation, Mix Column transformation
PART 4: Public Key Cryptography, RSA and Key Management
Principles of public key cryptosystems-Public key cryptosystems, Application for Public key cryptosystem requirements, Fermat’s theorem, Euler’s Totient Function, Euler’s theorem, RSA algorithm, Key management, Distribution of public keys, Publicly available directory,
Public key authority, public key certificates, Distribution of secret keys using public key cryptography
PART 5: Message Authentication and Hash Function Authentication requirements, Authentication functions- Message Encryption, Public Key
Encryption, Message Authentication Code, Hash function
Text Book
1. William Stallings, Cryptography and Network security: principles and practice", 4th Edition, Prentice Hall of India, New Delhi, 2006
Видео Cryptography and Network Security Part 4/5 | WIlliam Stallings |Secure communication - S8 EC, CS,KTU канала bushara abdulrahim
Block Cipher Principles – Stream Ciphers and Block Ciphers Feistel Cipher Feistel Decryption algorithm The Data encryption standard DES Decryption - Avalanche effect The AES Cipher substitute bytes transformation Shift row transformation Mix Column Transformation BUSHARA bushara bushara abdulrahim cryptography secure communication ect434 s8 ec ktu s8 cs ktu
Комментарии отсутствуют
Информация о видео
10 июля 2023 г. 6:00:00
00:55:35
Другие видео канала