Completed
Steganography
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography and Network Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction to Cryptography and Network Security
- 2 CIA Triad
- 3 The OSI Security Architecture
- 4 Security Attacks
- 5 Security Services
- 6 Security Mechanisms
- 7 Network Security Model
- 8 Cryptography
- 9 Cryptography – Key Terms
- 10 Cryptanalysis
- 11 Brute Force Attack
- 12 Classical Encryption Techniques
- 13 Caesar Cipher (Part 1)
- 14 Caesar Cipher (Part 2)
- 15 Monoalphabetic Cipher
- 16 Playfair Cipher (Part 1)
- 17 Playfair Cipher (Part 2)
- 18 Playfair Cipher (Solved Question)
- 19 Hill Cipher (Encryption)
- 20 Hill Cipher (Decryption)
- 21 Polyalphabetic Cipher (Vigenère Cipher)
- 22 Polyalphabetic Cipher (Vernam Cipher)
- 23 One Time Pad
- 24 Rail Fence Technique
- 25 Row Column Transposition Ciphering Technique
- 26 Steganography
- 27 LSB Steganography - Demo
- 28 Cryptography (Solved Questions)
- 29 Abstract Algebra and Number Theory
- 30 Prime Numbers in Cryptography
- 31 Modular Arithmetic (Part 1)
- 32 Modular Arithmetic (Part 2)
- 33 Modular Exponentiation (Part 1)
- 34 Modular Exponentiation (Part 2)
- 35 GCD - Euclidean Algorithm (Method 1)
- 36 GCD - Euclidean Algorithm (Method 2)
- 37 Relatively Prime (Co-Prime) Numbers
- 38 Euler’s Totient Function (Phi Function)
- 39 Euler’s Totient Function (Solved Examples)
- 40 Fermat's Little Theorem
- 41 Euler's Theorem
- 42 Primitive Roots
- 43 Multiplicative Inverse
- 44 Extended Euclidean Algorithm (Solved Example 1)
- 45 Extended Euclidean Algorithm (Solved Example 2)
- 46 Extended Euclidean Algorithm (Solved Example 3)
- 47 The Chinese Remainder Theorem (Solved Example 1)
- 48 The Chinese Remainder Theorem (Solved Example 2)
- 49 The Discrete Logarithm Problem
- 50 The Discrete Logarithm Problem (Solved Example)
- 51 Prime Factorization (Fermat's Factoring Method)
- 52 Testing for Primality (Fermat's Test)
- 53 Testing for Primality (Miller-Rabin Test)
- 54 Group and Abelian Group
- 55 Cyclic Group
- 56 Rings, Fields and Finite Fields
- 57 Stream Cipher vs. Block Cipher
- 58 Feistel Cipher Structure
- 59 Introduction to Data Encryption Standard (DES)
- 60 Single Round of DES Algorithm
- 61 The F Function of DES (Mangler Function)
- 62 Key Scheduling and Decryption in DES
- 63 Avalanche Effect and the Strength of DES
- 64 Data Encryption Standard (DES) - Solved Questions
- 65 Introduction to Advanced Encryption Standard (AES)
- 66 AES Encryption and Decryption
- 67 AES Round Transformation
- 68 AES Key Expansion
- 69 AES Security and Implementation Aspects
- 70 Multiple Encryption and Triple DES
- 71 Block Cipher Modes of Operation
- 72 Electronic Codebook (ECB)
- 73 Cipher Block Chaining (CBC)
- 74 Cipher Feedback (CFB)
- 75 Output Feedback (OFB)
- 76 Counter Mode (CTR)
- 77 Block Cipher Modes of Operation (Solved Question)
- 78 Pseudorandom Number Generator (PRNG)
- 79 Golomb’s Randomness Postulates
- 80 Public Key Cryptography | Chapter-4 | Cryptography & Network Security | nesoacademy.org
- 81 Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security | nesoacademy.org
- 82 System Practices & System Security | Chapter-6 | Cryptography & Network Security | nesoacademy.org
- 83 Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security | nesoacademy.org