Media Storage Type : 32 GB USB Stick
NPTEL Subject Matter Expert : Prof. Sourav Mukhopadhyay
NPTEL Co-ordinating Institute : IIT Kharagpur
NPTEL Lecture Count : 60
NPTEL Course Size : 15 GB
NPTEL PDF Text Transcription : Available and Included
NPTEL Subtitle Transcription : Available and Included (SRT)
Lecture Titles:
Lecture 1 - Introduction to Cryptography
Lecture 2 - Classical Cryptosystem
Lecture 3 - Cryptanalysis on Substitution Cipher (Frequency Analysis)
Lecture 4 - Play Fair Cipher
Lecture 5 - Block Cipher
Lecture 6 - Data Encryption Standard (DES)
Lecture 7 - DES (Continued...)
Lecture 8 - Triple DES and Modes of Operation
Lecture 9 - Stream Cipher
Lecture 10 - Pseudorandom Sequence
Lecture 11 - LFSR based Stream Cipher
Lecture 12 - Mathematical background
Lecture 13 - Abstract algebra (Continued...)
Lecture 14 - Number Theory
Lecture 15 - Modular Inverse
Lecture 16 - Modular Inverse
Lecture 17 - Extended Euclid Algorithm
Lecture 18 - Fermat's Little Theorem, Eular PhiFunction
Lecture 19 - Eular's theorem, Quadratic Residue
Lecture 20 - Polynomial Arithmetic
Lecture 21 - Advanced Encryption Standard (AES)
Lecture 22 - Advanced Encryption Standard (AES) (Continued...)
Lecture 23 - Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange
Lecture 24 - Knapsack Cryptosystem
Lecture 25 - RSA Cryptosystem
Lecture 26 - More on RSA
Lecture 27 - Primarily Testing
Lecture 28 - ElGamal Cryptosystem
Lecture 29 - Elliptic Curve over the Reals
Lecture 30 - Elliptic curve Modulo a Prime
Lecture 31 - Generalised ElGamal Public Key Cryptosystem
Lecture 32 - Chinese Remainder Theorem
Lecture 33 - Rabin Cryptosystem
Lecture 34 - Legendre and Jacobi Symbol
Lecture 35 - Jacobi Symbol (Continued...)
Lecture 36 - Message Authentication
Lecture 37 - Digital Signature
Lecture 38 - Key Management
Lecture 39 - Key Exchange
Lecture 40 - Hash Function
Lecture 41 - Universal Hashing
Lecture 42 - Cryptographic Hash Function
Lecture 43 - Secure Hash Algorithm (SHA)
Lecture 44 - Digital Signature Standard (DSS)
Lecture 45 - More on Key Exchange Protocol
Lecture 46 - Cryptanalysis
Lecture 47 - Time-Memory Trade-off Attack
Lecture 48 - Time-Memory Trade-off Attack
Lecture 49 - More on Differential Cryptanalysis
Lecture 50 - Linear Cryptanalysis
Lecture 51 - Cryptanalysis on Stream Cipher
Lecture 52 - Modern Stream Ciphers
Lecture 53 - Shamir's secret sharing and BE
Lecture 54 - Identity based Encryption (IBE)
Lecture 55 - Attribute based Encryption (ABE)
Lecture 56 - Functional Encryption
Lecture 57 - Solving discrete log problem
Lecture 58 - Implementation Attacks
Lecture 59 - The Secure Sockets Layer
Lecture 60 - Pretty Good Privacy