About
Contact
Register
Home
Programming
Java
HTML
CSS
JavaScript
React
Ajax
JQuery
PHP
Python
C Programming
node.js
Databases
Oracle
MySQL
MongoDB
Neo4j
Redis
Cassandra
Subjects
Cyber Security
Ethical Hacking
Database Management Systems
Advanced Database Management Systems
Software Engineering
Cyber Security Home
Cryptography - Maths Basics
Modular Arithmetic - Introduction
Mod of a Negative Number
Modular Exponentiation
Euclidean Algorithm
Extended Euclidean Algorithm
Modular Multiplicative Inverse
Chinese Reminder Theorem
Fermat's little Theorem
Miller Rabin Primality Testing
Eulers Totient Function
Cryptography Introduction
XOR and Shift Operations
Block Vs Stream Cipher
Block Cipher Modes
Data Encryption Standard
Double & Triple DES
Ceaser & Multiplicative Cipher
Playfair Cipher
Vigenere Cipher
Hill Cipher
Advanced Encryption Standard - I
Advanced Encryption Standard - II
Advanced Encryption Standard - III
Advanced Encryption Standard - IV
Discrete Logarithms
Diffie Hellman Key Exchange
Public Key Cryptography
Elgamal Cryptosystem
RSA Algorithm
Ellliptic Curve Cryptography - I
Ellliptic Curve Cryptography - II
Introduction to Hash Functions
SHA 512 Hash Algorithm
Message Authentication Code
Digital Signatures - Introduction
Elgamal Digital Signature
Digital Signature Standard
Cyber Crime Laws
Welcome to Cyber Security Course Work
In this section you will learn various encryption and decryption algorithms. You will also get a deeper insight on the working of various ciphers.
CAT 1 Syllabus for Cryptography and Network Security (BCSE309L)
Topic
Reference / Lecture
Modular arithmetic
https://codespindle.com/cybersecurity/cybersecurity-maths-basics.html
https://codespindle.com/cybersecurity/cybersecurity-modular-arithmetic.html
https://codespindle.com/cybersecurity/cybersecurity-negative-mod.html
https://codespindle.com/cybersecurity/cybersecurity-modular-exponentiation.html
Euclidian Algorithm
https://codespindle.com/cybersecurity/cybersecurity-euclidean-algorithm.html
Extended Euclidian Algorithm
https://codespindle.com/cybersecurity/cybersecurity-extended-euclidean.html
Modular Multiplicative Inverse
https://codespindle.com/cybersecurity/cybersecurity-modular-multiplicative.html
Fermats Theorem
https://codespindle.com/cybersecurity/cybersecurity-fermats-theorem.html
Eulers theorem
https://codespindle.com/cybersecurity/cybersecurity-euler-theorem.html
Chinese Reminder theorem
https://codespindle.com/cybersecurity/cybersecurity-chinese-reminder-theorem.html
Discrete Logarithms
https://codespindle.com/cybersecurity/cybersecurity-discrete-logarithm.html
Introduction to Cryptography
https://codespindle.com/cybersecurity/cybersecurity-cryptography-introduction.html
https://codespindle.com/cybersecurity/cybersecurity-bitwise-operation.html
Introduction to Stream cipher, Block cipher
https://codespindle.com/cybersecurity/cybersecurity-block-stream.html
Block Cipher Modes
https://codespindle.com/cybersecurity/cybersecurity-block-cipher-modes.html
Data Encryption Standard
https://codespindle.com/cybersecurity/cybersecurity-data-encryption-standard.html
Advanced Encryption Standard (4 Sessions)
https://codespindle.com/cybersecurity/cybersecurity-advanced-encryption-standard-session1.html
https://codespindle.com/cybersecurity/cybersecurity-advanced-encryption-standard-session2.html
https://codespindle.com/cybersecurity/cybersecurity-advanced-encryption-standard-session3.html
https://codespindle.com/cybersecurity/cybersecurity-advanced-encryption-standard-session4.html
IDEA
https://www.youtube.com/watch?v=FnM_usGqCuc
RC4
https://www.youtube.com/watch?v=ZYTECJ8p6I8