T.V. NAGARAJU TECHNICAL SOLUTIONS

Pages

  • Home
  • Online Courses
  • Tutorials
  • Operating Systems
  • C -Excercises
  • Python Excercises
  • JAVA Exercises
  • Placement Papers
  • Lab Programs
  • Python Programs

Network Security

  • Introduction to BASIC CONCEPTS
  • TYPES OF SECURITY ATTACKS
  • SECURITY SERVICES
  • SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example
  • PLAYFAIR CIPHER WITH EXAMPLE (SUBSTITUTION TECHNIQUE)
  • Substitution Techniques-Hill cipher
  • modes of operations
  • Feistel cipher/ strucutre
  • DES (Data Encryption standard) ALGORITHM
  • IDEA (International Data Encryption Standard)
  • AES (ADVANCED ENCRYPTION STANDARD)
  • BLOWFISH ALGORITHM
  • CAST 128 ALGORITHM
  • INTRODUCTION TO NUMBER THOERY
  • FERMAT'S THEOREM WITH SOLVED EXAMPLES
  • EULER'S THEOREM and EULER'S TOTIENT FUNCTION with examples
  • CHINESE REMAINDER THEOREM WITH EXAMPLES
  • Principles of public key cryptography
  • RSA ALGORITHM
  • DIFFIE HELLMAN KEY EXCHANGE
  • ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE
  • TYPES OF AUTHENTICATION
  • SHA-512 (Cryptographic hash functions)

at October 21, 2019
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Contact Form

Name

Email *

Message *

Contact List

  • GMAIL: nagarajutechnicaltrainer@gmail.com
  • WhatsApp: +91 9642290583

About Me

tv nagaraju
View my complete profile

Search This Blog

Followers

Simple theme. Theme images by luoman. Powered by Blogger.