InfoCoBuild

Cryptography and Network Security

Cryptography and Network Security. Instructor: Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography. Starting from the classical ciphers to modern day ciphers, the course provides an extensive coverage of the techniques and methods needed for the proper functioning of the ciphers. The course deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one way functions and trapdoor functions and presents the construction and cryptanalysis of public key ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also detailed. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols. (from nptel.ac.in)

Lecture 23 - Cryptographic Hash Functions


Go to the Course Home or watch other lectures:

Lecture 01 - Introduction
Lecture 02 - Overview on Modern Cryptography
Lecture 03 - Introduction to Number Theory
Lecture 04 - Probability and Information Theory
Lecture 05 - Classical Cryptosystems
Lecture 06 - Cryptanalysis of Classical Ciphers
Lecture 07 - Shannon's Theory
Lecture 08 - Shannon's Theory (cont.)
Lecture 09 - Shannon's Theory (cont.)
Lecture 10 - Symmetric Key Ciphers
Lecture 11 - Block Cipher Standards: DES (Data Encryption Standard)
Lecture 12 - Block Cipher Standards: AES (Advanced Encryption Standard)
Lecture 13 - Block Cipher Standards: AES (cont.)
Lecture 14 - Linear Cryptanalysis
Lecture 15 - Differential Cryptanalysis
Lecture 16 - Few Other Cryptanalytic Techniques
Lecture 17 - Overview on S-Box Design Principles
Lecture 18 - Modes of Operation of Block Ciphers
Lecture 19 - Stream Ciphers
Lecture 20 - Stream Ciphers (cont.)
Lecture 21 - Stream Ciphers (cont.)
Lecture 22 - Pseudorandomness
Lecture 23 - Cryptographic Hash Functions
Lecture 24 - Cryptographic Hash Functions (cont.)
Lecture 25 - Cryptographic Hash Functions (cont.)
Lecture 26 - Message Authentication Codes
Lecture 27 - More Number Theoretic Results
Lecture 28 - The RSA Cryptosystem
Lecture 29 - Primality Testing
Lecture 30 - Factoring Algorithms
Lecture 31 - Some Comments on the Security of RSA
Lecture 32 - Discrete Logarithm Problem (DLP)
Lecture 33 - The Diffie-Hellman Problem and Security of ElGamal Systems
Lecture 34 - An Introduction to Elliptic Curve Cryptography
Lecture 35 - Application of Elliptic Curves to Cryptography
Lecture 36 - Implementation of Elliptic Curve Cryptography
Lecture 37 - Secret Sharing Schemes
Lecture 38 - A Tutorial on Network Protocols
Lecture 39 - System Security
Lecture 40 - Firewalls and Intrusion Detection Systems
Lecture 41 - Side Channel Analysis of Cryptographic Implementations