Existing User
New User
Forgot Password
Login
Email
^{*}
Password
^{*}
Register
Email ID
^{*}
Password
^{*}
Confirm Password
^{*}
Name
^{*}
User Type
^{*}
Select
Student
Faculty
Others
Institute
^{*}
Branch
^{*}
Type the above text
^{*}
Forgot Password
Email
^{*}
Home

About Us

FAQ

Courses

Contact Us

SignIn
Syllabus

Lectures

Downloads
 FAQ 
Ask a question

Course Coordinated by
IIT Kharagpur
NPTEL
>>
Courses
>>
Computer Science and Engineering
>> Cryptography and Network Security (Video) >>
Introduction
Question in Lecture
Cryptography and Network Security
Introduction
Overview on Modern Cryptography
Introduction to Number Theory
Probability and Information Theory
Classical Cryptosystems
Cryptanalysis of Classical Ciphers
Shannons Theory
Shannons Theory (Contd...1)
Shannons Theory (Contd...2)
Symmetric Key Ciphers
Block Cipher Standards (DES)
Block Cipher Standards (AES)
Block Cipher Standards (AES) (Contd.)
Linear Cryptanalysis
Differential Cryptanalysis
Few other Cryptanalytic Techniques
Overview on SBox Design Principles
Modes of Operation of Block Ciphers
Stream Ciphers
Stream Ciphers (Contd...1)
Stream Ciphers (Contd...2)
Pseudorandomness
Cryptographic Hash Functions
Cryptographic Hash Functions (Contd...1)
Cryptographic Hash Functions (Contd...2)
Message Authentication Codes
More Number Theoretic Results
The RSA Cryptosystem
Primality Testing
Factoring Algorithms
Some Comments on the Security of RSA
Discrete Logarithm Problem (DLP)
The DiffieHellman Problem and Security of ElGamal Systems
An Introduction to Elliptic Curve Cryptography
Application of Elliptic Curves to Cryptography
Implementation of Elliptic Curve Cryptography
Secret Sharing Schemes
A Tutorial on Network Protocols
System Security
Firewalls and Intrusion Detection Systems
Side Channel Analysis of Cryptographic Implementations
Ask a Question
Question Topics :
Question:
Max: 300 char
NOTE: Before you post question check if your question already exists.Please do not repeat questions.
All Questions
Question:
Will NPTEL extend their online education system in other form of IT security ? A few of them I can remember now are Application and Middleware security , Operating system security , Security Evaluation methodologies. If so, please let us know what could be tentative date of release? Thank You
By:
Gurmeet
Date:
20120627
The coordinator will post his answer
Question:
What is RC2 and CAST algorithm
By:
suchita
Date:
20120702
The coordinator will post his answer
Question:
"secure email in xml format using web services" this is IEEE paper on 2007.Is there any scope of research in this topic. Is there any recent research work in this area.
By:
deepali
Date:
20121019
The coordinator will post his answer
Question:
How to find the inverse of a matrix in Hill Cipher
By:
Sunu Thomas
Date:
20131213
The coordinator will post his answer
Question:
masquerade will come under whick attack is it attack on fabrication or interruption
By:
satyanarayana
Date:
20121127
The coordinator will post his answer
Question:
denial of service will come under which attack
By:
satyanarayana
Date:
20121127
The coordinator will post his answer
Question:
Can we have the PPT Slides for the beautiful videos
By:
ashaq
Date:
20130101
The coordinator will post his answer
Question:
how to work in cryptography?
By:
dharmaraj
Date:
20130108
The coordinator will post his answer
Question:
Sir, what is the Different between RC5 and RC6 Block Cipher Algorithm? Thank you
By:
Raju
Date:
20130212
The coordinator will post his answer
Question:
A widely deployed message authentication technique is CBCMAC. Why do we not see MACs using the Counter mode.
By:
Owais
Date:
20130304
The coordinator will post his answer
Question:
Sir, From which lecture i can get feal 4 differential cryptanalysis?
By:
vishwa
Date:
20141120
The coordinator will post his answer
Question:
Can you please send me answers of the questions of assignment of this course ?
By:
test
Date:
20150226
The coordinator will post his answer
All Questions for this Course
Question:
Will NPTEL extend their online education system in other form of IT security ? A few of them I can remember now are Application and Middleware security , Operating system security , Security Evaluation methodologies. If so, please let us know what could be tentative date of release? Thank You
By:
Gurmeet
Date:
20120627
The coordinator will post his answer
Question:
What is RC2 and CAST algorithm
By:
suchita
Date:
20120702
The coordinator will post his answer
Question:
Respected Sir, I like neptel lectures very much. I surmise that one video of shannons theory is missing and same video(Shannons Theory Contd 1..) has been uploaded twice. I kindly request you to provide us missing video. Regards  Harikesh
By:
Harikesh
Date:
20120905
The coordinator will post his answer
Question:
I want the full explanation of the key transformation of DES. step by step specially the compression part, how it is compressed from 56bits to 48bits.
By:
Bodhi
Date:
20120923
The coordinator will post his answer
Question:
"secure email in xml format using web services" this is IEEE paper on 2007.Is there any scope of research in this topic. Is there any recent research work in this area.
By:
deepali
Date:
20121019
The coordinator will post his answer
Question:
How to find the inverse of a matrix in Hill Cipher
By:
Sunu Thomas
Date:
20131213
The coordinator will post his answer
Question:
masquerade will come under whick attack is it attack on fabrication or interruption
By:
satyanarayana
Date:
20121127
The coordinator will post his answer
Question:
denial of service will come under which attack
By:
satyanarayana
Date:
20121127
The coordinator will post his answer
Question:
Can we have the PPT Slides for the beautiful videos
By:
ashaq
Date:
20130101
The coordinator will post his answer
Question:
how to work in cryptography?
By:
dharmaraj
Date:
20130108
The coordinator will post his answer
Question:
Sir, what is the Different between RC5 and RC6 Block Cipher Algorithm? Thank you
By:
Raju
Date:
20130212
The coordinator will post his answer
Question:
A widely deployed message authentication technique is CBCMAC. Why do we not see MACs using the Counter mode.
By:
Owais
Date:
20130304
The coordinator will post his answer
Question:
Looks like this video is not uploaded correctly. It is duplicate of lecture 9 (next lecture). I am not able to understand this because continuity is lost. Please upload the correct video. Thank you so much to the team behind this  Viju.
By:
Viju
Date:
20130324
The coordinator will post his answer
Question:
Given 2 as a primitive root of 29, construct a table of discrete logarithms, and use it to solve the following congruence: x^2  4x  16 is congruent to 0 (mod 29)
By:
Preet
Date:
20131023
The coordinator will post his answer
Question:
Sir I didnt get why f(x,y)=M^N where x=N and y=M?
By:
Dhumal Amit
Date:
20131122
The coordinator will post his answer
Question:
Sir, From which lecture i can get feal 4 differential cryptanalysis?
By:
vishwa
Date:
20141120
The coordinator will post his answer
Question:
Can you please send me answers of the questions of assignment of this course ?
By:
test
Date:
20150226
The coordinator will post his answer
Disclaimer: We will take every effort to answer your question.However, in case of delay or no response NPTEL claims no responsibility.
Site Maintained by Web Studio, IIT Madras. Contact Webmaster:
nptel@iitm.ac.in