Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

NPTEL

Cryptography and Network Security

NPTEL and Indian Institute of Technology, Kharagpur via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it

Instructor: Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur.

The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography. Starting from the classical ciphers to modern-day ciphers, the course provides extensive coverage of the techniques and methods needed for the proper functioning of the ciphers. The course deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one-way functions and trapdoor functions and presents the construction and cryptanalysis of public-key ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also detailed. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols.

Syllabus

Introduction.
Overview on Modern Cryptography.
Introduction to Number Theory.
Probability and Information Theory.
Classical Cryptosystems.
Cryptanalysis of Classical Ciphers.
Shannons Theory.
Shannons Theory (Contd...1).
Shannons Theory (Contd...2).
Symmetric Key Ciphers.
Block Cipher Standards (DES).
Block Cipher Standards (AES).
Block Cipher Standards (AES) (Contd.).
Linear Cryptanalysis.
Differential Cryptanalysis.
Few other Cryptanalytic Techniques.
Overview on S-Box Design Principles.
Modes of Operation of Block Ciphers.
Stream Ciphers.
Stream Ciphers (Contd...1).
Stream Ciphers (Contd...2).
Pseudorandomness.
Cryptographic Hash Functions.
Cryptographic Hash Functions (Contd...1).
Cryptographic Hash Functions (Contd...2).
Message Authentication Codes.
More Number Theoretic Results.
The RSA Cryptosystem.
Primality Testing.
Factoring Algorithms.
Some Comments on the Security of RSA.
Discrete Logarithm Problem (DLP).
The Diffie-Hellman Problem and Security of ElGamal Systems.
An Introduction to Elliptic Curve Cryptography.
Application of Elliptic Curves to Cryptography.
Implementation of Elliptic Curve Cryptography.
Secret Sharing Schemes.
A Tutorial on Network Protocols.
System Security.
Firewalls and Intrusion Detection Systems.
Side Channel Analysis of Cryptographic Implementations.

Taught by

nptelhrd

Tags

Reviews

4.8 rating, based on 17 Class Central reviews

Start your review of Cryptography and Network Security

  • Profile image for Himanshu Kumar
    Himanshu Kumar
    Review: Cryptography and Computer Networks Cryptography plays a very important role in computer networks because it protects data when it travels from one computer to another through the internet. In networking, information passes through many rout…
  • Profile image for Binayak Sahu
    Binayak Sahu
    I just wrapped up the Cryptography and Network Security course, and honestly, it’s a game-changer for anyone curious about how the digital world stays locked down.
    Going in, I expected a dry lecture on math, but it was surprisingly engaging. I finally wrapped my head around how AES and RSA algorithms actually work—not just as formulas, but as the invisible shields for our daily data. Moving from the basics of encryption to the complexities of firewalls and digital signatures felt like gaining a superpower.
    It’s intense but incredibly rewarding. If you want to understand the "why" behind cybersecurity, this is it!
  • Profile image for Shahjad Ansari
    Shahjad Ansari
    Class Central is the ultimate search engine for online education. It aggregates over 250,000 courses from top providers like Coursera, edX, and Udemy, along with free university content from Harvard, MIT, and Stanford.
    ​Why it’s helpful:
    ​Avoid "Course Fatigue": Instead of checking ten sites, you search once.
    ​Unbiased Reviews: Thousands of students rate courses so you know what's worth your time.
    ​Curated Lists: They feature "Best of All Time" collections and guides for specific careers (like AI or Data Science).
    ​Free Certificates: It’s the best place to track down courses that offer free credentials.
  • Profile image for Abhishek Pandey
    Abhishek Pandey
    This course provides a well-structured and comprehensive learning experience. The concepts are explained clearly, making it easy to understand both fundamental and advanced topics. The content is organized logically, allowing learners to build knowledge step by step. Practical examples and real-world applications help in strengthening understanding and improving problem-solving skills. The assignments and discussions encourage active participation and critical thinking. Overall, the course is informative, engaging, and valuable for academic as well as professional growth. It offers a strong foundation and enhances technical confidence, making it a worthwhile addition to any learning journey.
  • Profile image for Abhay Pratap Singh
    Abhay Pratap Singh
    This course provides a well-structured and comprehensive learning experience. The concepts are explained clearly, making it easy to understand both fundamental and advanced topics. The content is organized logically, allowing learners to build knowledge step by step. Practical examples and real-world applications help in strengthening understanding and improving problem-solving skills. The assignments and discussions encourage active participation and critical thinking. Overall, the course is informative, engaging, and valuable for academic as well as professional growth. It offers a strong foundation and enhances technical confidence, making it a worthwhile addition to any learning journey.
  • Profile image for Anushka Bairoliya
    Anushka Bairoliya
    The Cryptography course was extremely informative and well-structured. It provided a strong foundation in encryption techniques, hashing algorithms, digital signatures, and network security concepts. Complex topics like symmetric and asymmetric encryption were explained clearly with practical examples, making them easy to understand. The hands-on exercises helped strengthen my understanding of real-world applications of cryptography in cybersecurity. Overall, this course enhanced my knowledge of data protection and secure communication, and it is highly recommended for anyone interested in cybersecurity or computer science.
  • Profile image for Anshu Kumar
    Anshu Kumar
    Good course with best platforms in the world application for the shake of the image of the image of the image and ensure no one can be servive by the way to the background of the first time in my life display etc and the same format with the other day tomorrow in case we will enjoy to be there for me ur id and phone number in java phone pro series in a good way
  • Ayush Choudhary
    The Cryptography and Network Security course on NPTEL via is an excellent learning resource for students interested in cybersecurity and secure communication. The lectures explain complex concepts like encryption, digital signatures, authentication, and network security protocols in a clear and structured way. The instructors use practical examples that make understanding easier, even for beginners. The course content is well-organized and suitable for computer science students preparing for exams or building foundational knowledge. Overall, it is a highly informative, free, and reliable platform to learn cryptography and network security in a simple and effective manner
  • Yeh course cryptography aur network security ke basics samajhne ke liye bahut accha hai. Isme symmetric aur asymmetric key cryptography jaise complex topics ko bade aasaan tareeke se samjhaya gaya hai. Assignments thode challenging hain par concept clear karne mein bahut madad karte hain. Overall, cybersecurity mein career banane ke liye yeh ek best foundational course hai.
  • Profile image for Udit Kumar
    Udit Kumar
    Yeh course cryptography ke mathematical concepts ko samajhne ke liye bahut badhiya hai. Prof. ne complex algorithms ko kaafi simplify karke samjhaya hai. Network security protocols aur real-world attacks ki knowledge gain karne ke liye yeh best resource hai. Assignments thode tough hain par seekhne ko bahut milta hai.
  • This courses is very useful for me and I learn many new concepts from this . The way of telling i easily understand and adapt fastly . It is such a great platform that i found and every one should visit here .
  • Profile image for Dhirendar Yadav
    Dhirendar Yadav
    perfect but certificate is missing so kindly attach certificate which can boost our skills. All things in this course is completely good and i am very glad to thank my teacher to make me enroll in this course

  • Aryan Singh
    The teachers are great and the explanation is very good in this series I learned lots of thing with full explanation all the Videos are clear and perfect for view
  • Profile image for Krish Chaudhary
    Krish Chaudhary
    Best videos for cryptography and networking
    Best videos for cryptography and networking
    Best videos for cryptography and networking
    Best videos for cryptography and networking
    Best videos for cryptography and networking
    Best videos for cryptography and networking
  • Anshika Jindal
    This is very good course and it is beginner friendly too..I understood it very well......................................
  • Profile image for Abdullah Farooqui
    Abdullah Farooqui
    Wonderful course, recommend for everyone, the course process was very easy and meaningful videos are there
  • Profile image for Mohamed Khaled Abdelfattah Youssef
    Mohamed Khaled Abdelfattah Youssef
    Cryptography and Network Security is the fundamental bedrock of our modern digital world. This subject moves far beyond simple passwords, delving into the sophisticated mathematical principles that protect our data. You explore everything from ancient ciphers to modern marvels like public-key cryptography (RSA, ECC), hash functions, and digital signatures. It's challenging but incredibly rewarding, as it demystifies how secure communication, online banking, and data privacy actually work.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.