Videos
Lecture 1 - Introduction to Cryptography
Lecture 2 - Classical Cryptosystem
Lecture 3 - Cryptanalysis on Substitution Cipher (Frequency Analysis)
Lecture 4 - Play Fair Cipher
Lecture 5 - Block Cipher
Lecture 6 - Data Encryption Standard (DES)
Lecture 7 - DES (Continued...)
Lecture 8 - Triple DES and Modes of Operation
Lecture 9 - Stream Cipher
Lecture 10 - Pseudorandom Sequence
Lecture 11 - LFSR Based StreamCipher
Lecture 12 - Mathematical Background
Lecture 13 - Abstract Algebra (Continued...)
Lecture 14 - Number Theory
Lecture 15 - Number Theory (Continued...)
Lecture 16 - Modular Inverse
Lecture 17 - Extended Euclidean Algorithm
Lecture 18 - Fermat's Little Theorem, Euler Phi-Function
Lecture 19 - Euler's theorem, Quadratic Residue
Lecture 20 - Polynomial Arithmetic
Lecture 21 - Advanced Encryption Standard (AES)
Lecture 22 - Advanced Encryption Standard (AES) (Continued...)
Lecture 23 - Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange
Lecture 24 - Knapsack Cryptosystem
Lecture 25 - RSA Cryptosystem
Lecture 26 - More on RSA
Lecture 27 - Primarily Testing
Lecture 28 - ElGamal Cryptosystem
Lecture 29 - Elliptic Curve over the Reals
Lecture 30 - Elliptic curve Modulo a Prime
Lecture 31 - Generalised ElGamal Public Key Cryptosystem
Lecture 32 - Chinese Remainder Theorem
Lecture 33 - Rabin Cryptosystem
Lecture 34 - Legendre and Jacobi Symbol
Lecture 35 - Jacobi Symbol (Continued...)
Lecture 36 - Message Authentication
Lecture 37 - Digital Signature
Lecture 38 - Key Management
Lecture 39 - Key Exchange
Lecture 40 - Hash Function
Lecture 41 - Universal Hashing
Lecture 42 - Cryptographic Hash Function
Lecture 43 - Secure Hash Algorithm (SHA)
Lecture 44 - Digital Signature Standard (DSS)
Lecture 45 - More on Key Exchange Protocol
Lecture 46 - Cryptoanalisis
Lecture 47 - Memory Trade off Attack
Lecture 48 - Differential Cryptoanalysis
Lecture 49 - More on Differential Cryptoanalysis
Lecture 50 - Linear Cryptoanalysis
Lecture 51 - Cryptoanalysis and Stream Cipher
Lecture 52 - Modern Stream Cipher
Lecture 53 - Shamir Secret Sharing
Lecture 54 - Identity Based Eneryption (IBE)
Lecture 55 - Attribute Based Encryption
Lecture 56 - Functional Encryption (Introduction)
Lecture 57 - Discrete Logarithm Problem (DLP)
Lecture 58 - Implementation Attacks
Lecture 59 - The Secure Sockets layer (SSL)
Lecture 60 - Pretty Good Privacy (PGP)
PDF
NPTEL PDF Lecture links are currently unavailable for this video course
All the NPTEL Video and PDF lectures are available for free download from the NPTEL website https://nptel.ac.in
NPTEL Video Course : NOC:Cryptography And Network Security
Lecture 1 - Introduction to Cryptography
Home
Next
Thumbnails