T.V. NAGARAJU TECHNICAL SOLUTIONS
Pages
Home
Online Courses
Tutorials
Operating Systems
C -Excercises
Python Excercises
JAVA Exercises
Placement Papers
Lab Programs
Python Programs
network security
1.
BASIC CONCEPTS
2.
TYPES OF SECURITY ATTACKS
3.
SECURITY SERVICES
4.
SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example
5.
Substitution Techniques -Play fair cipher with examples
6.
Substitution Techniques-Hill cipher
with example
7.
f
eistel cipher/strucutre
8.
M
odes of operations
9.
DES (dataencryption standard) algorithm
10.
IDEA(International Data Encryption Standard)
11.
AES (Advanced Encryption Standard)
12.
B
low fish algorithm
13.
Cast 128 algorithm
14.
I
ntroduction to Number
Theory
15.
fermat's theorem with solved examples
16.
E
uler's theorem and Euler's totient function with examples
17.
C
hinese remainder theorem with examples
18.
Principlesof public key cryptography
19.
RSA
algorithm
20.
Diffie Hellman key exchange
21.
E
llipticcurve cryptography & diffie helman key exchange
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment