- Introduction to BASIC CONCEPTS
 - TYPES OF SECURITY ATTACKS
 - SECURITY SERVICES
 - SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example
 - PLAYFAIR CIPHER WITH EXAMPLE (SUBSTITUTION TECHNIQUE)
 - Substitution Techniques-Hill cipher
 - modes of operations
 - Feistel cipher/ strucutre
 - DES (Data Encryption standard) ALGORITHM
 - IDEA (International Data Encryption Standard)
 - AES (ADVANCED ENCRYPTION STANDARD)
 - BLOWFISH ALGORITHM
 - CAST 128 ALGORITHM
 - INTRODUCTION TO NUMBER THOERY
 - FERMAT'S THEOREM WITH SOLVED EXAMPLES
 - EULER'S THEOREM and EULER'S TOTIENT FUNCTION with examples
 - CHINESE REMAINDER THEOREM WITH EXAMPLES
 - Principles of public key cryptography
 - RSA ALGORITHM
 - DIFFIE HELLMAN KEY EXCHANGE
 - ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE
 - TYPES OF AUTHENTICATION
 - SHA-512 (Cryptographic hash functions)
 
Network Security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment