Skip to main content


Cryptography and Network Security


Protection of sensitive information from adversaries has been a practice since centuries. As children, many of us had magic decoder rings for exchanging coded messages with our friends and possibly keeping secrets from parents, siblings or teachers. Sensitive information will be passed on between allies at war times. Cryptographic methods were traditionally used to prevent the enemy from learning sensitive military information.  As society has evolved, the need for more sophisticated methods of protecting data has increased.


The study of techniques needed to protect information is the field of Cryptography/Cryptology. Cryptanalysis deals with the methods required for breaking the protection.

Of course this is impossible without thorough understanding of the cryptographic method used for protection.

The course material has 4 modules. Module 1 begins with recent trends in security, overview of attacks and threats, standards in security services, mechanisms to provide security services. These topics are discussed in first two units of the module .

Later half of module 1 details two important methods of protecting data namely, substitution and transposition.  Units 1 and 2 of module 2 describe an important cipher method called DES (Data Encryption Standard) and attacks specially devised for this method.

In unit 3 variants of DES is discussed .The module concludes with stream ciphers in unit 4. Asymmetric encryption is the topic of discussion in module 3.

This covers the necessary background mathematics, public key crypto systems, RSA method, exchange of keys and digital signatures in various units.

The last module of the material touches upon, internet security, web security, password management, malicious software and firewalls.


File Type: PDF
File Size: 2.70 MB
Total Pages: 239

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments

Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Android Things Quick Start Guide

Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Android Things is the IoT platform made by Google, based on Android. It allows us to build smart devices in a simple and convenient way, leveraging on the Android ecosystem tools and libraries, while letting Google take care of security updates.

Programming QuickStart Box Set

This tutorial on HTML is designed specifically for aspiring developers and web designers. This tutorial is explained in enough detail with practical examples and a simple overview so that it can be easily understood by beginners and provides enough knowledge to design their own webpages. You can get a higher level of expertise with some practice.  HTML or Hyper Text Markup Language is the most commonly used language for developing web pages.