Completed
Polyalphabetic Cipher (Vigenère Cipher)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography and Network Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction to Cryptography and Network Security
- 2 CIA Triad
- 3 The OSI Security Architecture
- 4 Security Attacks
- 5 Security Services
- 6 Security Mechanisms
- 7 Network Security Model
- 8 Cryptography
- 9 Cryptography – Key Terms
- 10 Cryptanalysis
- 11 Brute Force Attack
- 12 Classical Encryption Techniques
- 13 Caesar Cipher (Part 1)
- 14 Caesar Cipher (Part 2)
- 15 Monoalphabetic Cipher
- 16 Playfair Cipher (Part 1)
- 17 Playfair Cipher (Part 2)
- 18 Playfair Cipher (Solved Question)
- 19 Hill Cipher (Encryption)
- 20 Hill Cipher (Decryption)
- 21 Polyalphabetic Cipher (Vigenère Cipher)
- 22 Polyalphabetic Cipher (Vernam Cipher)
- 23 One Time Pad
- 24 Rail Fence Technique
- 25 Row Column Transposition Ciphering Technique
- 26 Steganography
- 27 LSB Steganography - Demo
- 28 Cryptography (Solved Questions)
- 29 Abstract Algebra and Number Theory
- 30 Prime Numbers in Cryptography
- 31 Modular Arithmetic (Part 1)
- 32 Modular Arithmetic (Part 2)
- 33 Modular Exponentiation (Part 1)
- 34 Modular Exponentiation (Part 2)
- 35 GCD - Euclidean Algorithm (Method 1)
- 36 GCD - Euclidean Algorithm (Method 2)
- 37 Relatively Prime (Co-Prime) Numbers
- 38 Euler’s Totient Function (Phi Function)
- 39 Euler’s Totient Function (Solved Examples)
- 40 Fermat's Little Theorem
- 41 Euler's Theorem
- 42 Primitive Roots
- 43 Multiplicative Inverse
- 44 Extended Euclidean Algorithm (Solved Example 1)
- 45 Extended Euclidean Algorithm (Solved Example 2)
- 46 Extended Euclidean Algorithm (Solved Example 3)
- 47 The Chinese Remainder Theorem (Solved Example 1)
- 48 The Chinese Remainder Theorem (Solved Example 2)
- 49 The Discrete Logarithm Problem
- 50 The Discrete Logarithm Problem (Solved Example)
- 51 Prime Factorization (Fermat's Factoring Method)
- 52 Testing for Primality (Fermat's Test)
- 53 Testing for Primality (Miller-Rabin Test)
- 54 Group and Abelian Group
- 55 Cyclic Group
- 56 Rings, Fields and Finite Fields
- 57 Stream Cipher vs. Block Cipher
- 58 Feistel Cipher Structure
- 59 Introduction to Data Encryption Standard (DES)
- 60 Single Round of DES Algorithm
- 61 The F Function of DES (Mangler Function)
- 62 Key Scheduling and Decryption in DES
- 63 Avalanche Effect and the Strength of DES
- 64 Data Encryption Standard (DES) - Solved Questions
- 65 Introduction to Advanced Encryption Standard (AES)
- 66 AES Encryption and Decryption
- 67 AES Round Transformation
- 68 AES Key Expansion
- 69 AES Security and Implementation Aspects
- 70 Multiple Encryption and Triple DES
- 71 Block Cipher Modes of Operation
- 72 Electronic Codebook (ECB)
- 73 Cipher Block Chaining (CBC)
- 74 Cipher Feedback (CFB)
- 75 Output Feedback (OFB)
- 76 Counter Mode (CTR)
- 77 Block Cipher Modes of Operation (Solved Question)
- 78 Pseudorandom Number Generator (PRNG)
- 79 Golomb’s Randomness Postulates
- 80 Public Key Cryptography | Chapter-4 | Cryptography & Network Security | nesoacademy.org
- 81 Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security | nesoacademy.org
- 82 System Practices & System Security | Chapter-6 | Cryptography & Network Security | nesoacademy.org
- 83 Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security | nesoacademy.org