-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Web Security Issues - Secure Sockets Layer (SSL), Transport Layer Security (TLS), IP Security Overview - Policy, Encapsulating Security Payload, Intruders-Intrusion Detection - Malicious Software, Viruses – Worms – Kerberos, Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations, Email Security Pretty Good Privacy (PGP) - S/MIME
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:Cryptography and security
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Public Key crptosystems
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:Introduction to Encryption Standard
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:Public Key crptosystems, hash functions
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:The Chinese Remainder Theorem - Principles of Public Key Cryptosystem
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Distribution of Public Keys - X.509 Certificates, Symmetric Key Distribution Using Asymmetric Encryption, Key Management And Distribution
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:The RSA Algorithm, Diffie Hellman Key Exchange, ElGamal Cryptosystem, Public Key crptosystems, Cryptographic Hash Functions, Two Simple Hash Functions Requirements and Security , Hash Functions Based on Cipher Block Chaining, Secure Hash Algorithm (SHA) - Message Authentication Codes, Message Authentication Requirements - Message Authentication Code, Security of MACs - MACs Based on Hash Functions (HMAC), Digital Signatures - ElGamal Digital Signature Scheme, Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Computer Security Concepts, The OSI Security Architecture, 3 Security Attacks - A Model for Network Security, 4 Symmetric Cipher Model, Substitution Techniques - Transposition Techniques, Block Cipher Principles - Data Encryption Standard (DES)- Example, Multiple Encryption and Triple DES , Stream Ciphers - RC4, Principles of Pseudorandom Number Generation, Pseudorandom Number Generators -Divisibility and the Division Algorithm, The Euclidean Algorithm - Modular Arithmetic