- Introduction to BASIC CONCEPTS
- TYPES OF SECURITY ATTACKS
- SECURITY SERVICES
- SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example
- PLAYFAIR CIPHER WITH EXAMPLE (SUBSTITUTION TECHNIQUE)
- Substitution Techniques-Hill cipher
- modes of operations
- Feistel cipher/ strucutre
- DES (Data Encryption standard) ALGORITHM
- IDEA (International Data Encryption Standard)
- AES (ADVANCED ENCRYPTION STANDARD)
- BLOWFISH ALGORITHM
- CAST 128 ALGORITHM
- INTRODUCTION TO NUMBER THOERY
- FERMAT'S THEOREM WITH SOLVED EXAMPLES
- EULER'S THEOREM and EULER'S TOTIENT FUNCTION with examples
- CHINESE REMAINDER THEOREM WITH EXAMPLES
- Principles of public key cryptography
- RSA ALGORITHM
- DIFFIE HELLMAN KEY EXCHANGE
- ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE
- TYPES OF AUTHENTICATION
- SHA-512 (Cryptographic hash functions)
Network Security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment