T.V. NAGARAJU TECHNICAL SOLUTIONS

Pages

  • Home
  • Online Courses
  • Tutorials
  • Operating Systems
  • C -Excercises
  • Python Excercises
  • JAVA Exercises
  • Placement Papers
  • Lab Programs
  • Python Programs

network security


1. BASIC CONCEPTS

2. TYPES OF SECURITY ATTACKS

3. SECURITY SERVICES

4.  SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example

5. Substitution Techniques -Play fair cipher with examples

6. Substitution Techniques-Hill cipher with example
7.  feistel cipher/strucutre

8. M
odes of operations

9. DES (dataencryption standard) algorithm

10. IDEA(International Data Encryption Standard) 

11. AES (Advanced Encryption Standard)

12. Blow fish algorithm

13. Cast 128 algorithm

14. Introduction to Number Theory

15.  fermat's theorem with solved examples

16. Euler's theorem and Euler's totient function with examples

17. Chinese remainder theorem with examples

18. Principlesof public key cryptography

19. 
 RSA
 algorithm

20. Diffie Hellman key exchange

21. Ellipticcurve cryptography & diffie helman key exchange







at March 20, 2019
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Contact Form

Name

Email *

Message *

Contact List

  • GMAIL: nagarajutechnicaltrainer@gmail.com
  • WhatsApp: +91 9642290583

About Me

tv nagaraju
View my complete profile

Search This Blog

Followers

Simple theme. Theme images by luoman. Powered by Blogger.