Cryptography and Network Security

Cryptography and Network Security

Neso Academy via YouTube Direct link

Rings, Fields and Finite Fields

56 of 83

56 of 83

Rings, Fields and Finite Fields

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cryptography and Network Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction to Cryptography and Network Security
  2. 2 CIA Triad
  3. 3 The OSI Security Architecture
  4. 4 Security Attacks
  5. 5 Security Services
  6. 6 Security Mechanisms
  7. 7 Network Security Model
  8. 8 Cryptography
  9. 9 Cryptography – Key Terms
  10. 10 Cryptanalysis
  11. 11 Brute Force Attack
  12. 12 Classical Encryption Techniques
  13. 13 Caesar Cipher (Part 1)
  14. 14 Caesar Cipher (Part 2)
  15. 15 Monoalphabetic Cipher
  16. 16 Playfair Cipher (Part 1)
  17. 17 Playfair Cipher (Part 2)
  18. 18 Playfair Cipher (Solved Question)
  19. 19 Hill Cipher (Encryption)
  20. 20 Hill Cipher (Decryption)
  21. 21 Polyalphabetic Cipher (Vigenère Cipher)
  22. 22 Polyalphabetic Cipher (Vernam Cipher)
  23. 23 One Time Pad
  24. 24 Rail Fence Technique
  25. 25 Row Column Transposition Ciphering Technique
  26. 26 Steganography
  27. 27 LSB Steganography - Demo
  28. 28 Cryptography (Solved Questions)
  29. 29 Abstract Algebra and Number Theory
  30. 30 Prime Numbers in Cryptography
  31. 31 Modular Arithmetic (Part 1)
  32. 32 Modular Arithmetic (Part 2)
  33. 33 Modular Exponentiation (Part 1)
  34. 34 Modular Exponentiation (Part 2)
  35. 35 GCD - Euclidean Algorithm (Method 1)
  36. 36 GCD - Euclidean Algorithm (Method 2)
  37. 37 Relatively Prime (Co-Prime) Numbers
  38. 38 Euler’s Totient Function (Phi Function)
  39. 39 Euler’s Totient Function (Solved Examples)
  40. 40 Fermat's Little Theorem
  41. 41 Euler's Theorem
  42. 42 Primitive Roots
  43. 43 Multiplicative Inverse
  44. 44 Extended Euclidean Algorithm (Solved Example 1)
  45. 45 Extended Euclidean Algorithm (Solved Example 2)
  46. 46 Extended Euclidean Algorithm (Solved Example 3)
  47. 47 The Chinese Remainder Theorem (Solved Example 1)
  48. 48 The Chinese Remainder Theorem (Solved Example 2)
  49. 49 The Discrete Logarithm Problem
  50. 50 The Discrete Logarithm Problem (Solved Example)
  51. 51 Prime Factorization (Fermat's Factoring Method)
  52. 52 Testing for Primality (Fermat's Test)
  53. 53 Testing for Primality (Miller-Rabin Test)
  54. 54 Group and Abelian Group
  55. 55 Cyclic Group
  56. 56 Rings, Fields and Finite Fields
  57. 57 Stream Cipher vs. Block Cipher
  58. 58 Feistel Cipher Structure
  59. 59 Introduction to Data Encryption Standard (DES)
  60. 60 Single Round of DES Algorithm
  61. 61 The F Function of DES (Mangler Function)
  62. 62 Key Scheduling and Decryption in DES
  63. 63 Avalanche Effect and the Strength of DES
  64. 64 Data Encryption Standard (DES) - Solved Questions
  65. 65 Introduction to Advanced Encryption Standard (AES)
  66. 66 AES Encryption and Decryption
  67. 67 AES Round Transformation
  68. 68 AES Key Expansion
  69. 69 AES Security and Implementation Aspects
  70. 70 Multiple Encryption and Triple DES
  71. 71 Block Cipher Modes of Operation
  72. 72 Electronic Codebook (ECB)
  73. 73 Cipher Block Chaining (CBC)
  74. 74 Cipher Feedback (CFB)
  75. 75 Output Feedback (OFB)
  76. 76 Counter Mode (CTR)
  77. 77 Block Cipher Modes of Operation (Solved Question)
  78. 78 Pseudorandom Number Generator (PRNG)
  79. 79 Golomb’s Randomness Postulates
  80. 80 Public Key Cryptography | Chapter-4 | Cryptography & Network Security | nesoacademy.org
  81. 81 Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security | nesoacademy.org
  82. 82 System Practices & System Security | Chapter-6 | Cryptography & Network Security | nesoacademy.org
  83. 83 Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security | nesoacademy.org

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.