Cryptography and Network Security


Lecture 1 - Introduction


Lecture 2 - Overview on Modern Cryptography


Lecture 3 - Introduction to Number Theory


Lecture 4 - Probability and Information Theory


Lecture 5 - Classical Cryptosystems


Lecture 6 - Cryptanalysis of Classical Ciphers


Lecture 7 - Shannons Theory


Lecture 8 - Shannons Theory (Continued...1)


Lecture 9 - Shannons Theory (Continued...2)


Lecture 10 - Symmetric Key Ciphers


Lecture 11 - Block Cipher Standards (DES)


Lecture 12 - Block Cipher Standards (AES)


Lecture 13 - Block Cipher Standards (AES) (Continued...)


Lecture 14 - Linear Cryptanalysis


Lecture 15 - Differential Cryptanalysis


Lecture 16 - Few other Cryptanalytic Techniques


Lecture 17 - Overview on S-Box Design Principles


Lecture 18 - Modes of Operation of Block Ciphers


Lecture 19 - Stream Ciphers


Lecture 20 - Stream Ciphers (Continued...1)


Lecture 21 - Stream Ciphers (Continued...2)


Lecture 22 - Pseudorandomness


Lecture 23 - Cryptographic Hash Functions


Lecture 24 - Cryptographic Hash Functions (Continued...1)


Lecture 25 - Cryptographic Hash Functions (Continued...2)


Lecture 26 - Message Authentication Codes


Lecture 27 - More Number Theoretic Results


Lecture 28 - The RSA Cryptosystem


Lecture 29 - Primality Testing


Lecture 30 - Factoring Algorithms


Lecture 31 - Some Comments on the Security of RSA


Lecture 32 - Discrete Logarithm Problem (DLP)


Lecture 33 - The Diffie-Hellman Problem and Security of ElGamal Systems


Lecture 34 - An Introduction to Elliptic Curve Cryptography


Lecture 35 - Application of Elliptic Curves to Cryptography


Lecture 36 - Implementation of Elliptic Curve Cryptography


Lecture 37 - Secret Sharing Schemes


Lecture 38 - A Tutorial on Network Protocols


Lecture 39 - System Security


Lecture 40 - Firewalls and Intrusion Detection Systems


Lecture 41 - Side Channel Analysis of Cryptographic Implementations