NPTEL : NOC:Foundations of Cryptography (Computer Science and Engineering)

Co-ordinators : Prof. Ashish Choudhury


Lecture 1 - Introduction

Lecture 2 - Symmetric-key Encryption

Lecture 3 - Historical Ciphers and their Cryptanalysis

Lecture 4 - Perfect Security

Lecture 5 - Limitations of Perfect Security

Lecture 6 - Introduction to Computational Security

Lecture 7 - Semantic Security

Lecture 8 - Pseudo-random Generators (PRGs)

Lecture 9 - Operations on Pseudorandom Generators

Lecture 10 - Stream Ciphers

Lecture 11 - Provably-secure Instantiation of PRG

Lecture 12 - Practical Instantiations of PRG

Lecture 13 - CPA-security

Lecture 14 - Pseudo-random Functions (PRFs)

Lecture 15 - CPA-secure Encryption from PRF

Lecture 16 - Modes of Operations of Block Ciphers - Part I

Lecture 17 - Modes of Operations of Block Ciphers - Part II

Lecture 18 - Theoretical Constructions of Block Ciphers

Lecture 19 - Practical Constructions of Block Ciphers - Part I

Lecture 20 - Practical Constructions of Block Ciphers - Part II

Lecture 21 - From Passive to Active Adversary

Lecture 22 - Message Integrity and Authentication

Lecture 23 - Message Authentication for Long Messages - Part I

Lecture 24 - Message Authentication for Long Messages - Part II

Lecture 25 - Information-theoretic MACs - Part I

Lecture 26 - Information-theoretic MACs - Part II

Lecture 27 - Cryptographic Hash Functions - Part I

Lecture 28 - Cryptographic Hash Functions - Part II

Lecture 29 - Message Authentication Using Hash Functions

Lecture 30 - Generic Attacks on Hash Functions and Additional Applications of Hash Functions

Lecture 31 - Random Oracle Model - Part I

Lecture 32 - Random Oracle Model - Part II

Lecture 33 - Authenticated Encryption

Lecture 34 - Composing CPA-secure Cipher with a Secure MAC - Part I

Lecture 35 - Composing CPA-secure Cipher with a Secure MAC - Part II

Lecture 36 - Key-Exchange Protocols - Part I

Lecture 37 - Key-Exchange Protocols - Part II

Lecture 38 - Cyclic groups

Lecture 39 - Cryptographic Hardness Assumptions in the Cyclic Groups

Lecture 40 - Candidate Cyclic Groups for Cryptographic Purposes - Part I

Lecture 41 - Candidate Cyclic Groups for Cryptographic Purposes - Part II

Lecture 42 - Cryptographic Applications of the Discrete Log Assumption

Lecture 43 - Public-key Encryption

Lecture 44 - El Gamal Public-key Encryption Scheme

Lecture 45 - RSA Assumption

Lecture 46 - RSA Public-key Cryptosystem

Lecture 47 - Hybrid Public-key Cryptosystem

Lecture 48 - CCA-Secure Public-key Ciphers

Lecture 49 - CCA-Secure Public-key Ciphers Based on Diffie-Hellman Problems

Lecture 50 - CCA-Secure Public-key Ciphers Based on RSA Assumption

Lecture 51 - Digital Signatures

Lecture 52 - RSA Signatures

Lecture 53 - Identification Schemes

Lecture 54 - Schnorr Signature Scheme and TLS/SSL

Lecture 55 - Number Theory

Lecture 56 - Secret Sharing

Lecture 57 - Zero-Knowledge Protocols - Part I

Lecture 58 - Zero-Knowledge Protocols - Part II

Lecture 59 - Good Bye for Now