Cryptography and Network Security: Secure Communication - Part 3 of 5

This segment, based on William Stallings' textbook, covers the introduction to classic encryption techniques, OSI security architecture, and explores various security attacks, including passive and active attacks.

bushara abdulrahim•490 views•48:22

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

BASED ON WILLIAM STALLINGS TEXTBOOK PART1: Introduction and Classic Encryption Techniques OSI security architecture, Security attacks – Passive attacks, Active attacks, Security services- Authentication, Access Control, Data Confidentiality, Data integrity, Nonrepudiation, Availability service. Model for network security. Symmetric cipher model, Cryptography, Cryptoanalysis, Substitution techniques- Hill Cipher, One time pad, Transposition Techniques PART 2: Finite Fields Groups,Rings and Fields, Modular arithmetic, Euclidian algorithm, Finite Fields of the form GF(p), Polynomial arithmetic PART 3: Block Ciphers. Data Encryption Standard, AES Cipher Block Cipher Principles – Stream Ciphers and Block Ciphers, Feistel Cipher, Feistel Decryption algorithm, The Data encryption standard, DES Decryption - Avalanche effect, The AES Cipher, substitute bytes transformation, Shift row transformation, Mix Column transformation PART 4: Public Key Cryptography, RSA and Key Management Principles of public key cryptosystems-Public key cryptosystems, Application for Public key cryptosystem requirements, Fermat’s theorem, Euler’s Totient Function, Euler’s theorem, RSA algorithm, Key management, Distribution of public keys, Publicly available directory, Public key authority, public key certificates, Distribution of secret keys using public key cryptography PART 5: Message Authentication and Hash Function Authentication requirements, Authentication functions- Message Encryption, Public Key Encryption, Message Authentication Code, Hash function Text Book 1. William Stallings, Cryptography and Network security: principles and practice", 4th Edition, Prentice Hall of India, New Delhi, 2006

Video Information

Views
490

Total views since publication

Likes
5

User likes and reactions

Duration
48:22

Video length

Published
Jun 30, 2023

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.