Network Security / Cryptography / Information Security

Information Security Most IMP Topics for GTU Exam (29-12-2021) - Click Here

Unit – 1

Basic Terms of Network Security - Video Link | Blog Link

Network Security Model – Video Link | Blog Link

CIA Triangle (Security Services) – Video Link | Blog Link

Symmetric Cipher Model (Symmetric key cryptography) – Video Link | Blog Link

Asymmetric Cipher Model (Asymmetric key cryptography) – Video Link | Blog Link

Differentiate Symmetric and Asymmetric Key Cryptography – Video Link | Blog Link

Types of Attack: Blog Link

Active Attack – Video Link | Blog Link

Passive Attack – Video Link | Blog Link

Differentiate active attack and passive attack – Video Link | Blog Link

Substitution Cipher:

Caesar cipher – Video Link | Blog Link

Monoalphabetic Cipher – Video Link | Blog Link

Play fair cipher – Video Link | Blog Link

Vigenère Cipher (Polyalphabetic Cipher) – Video Link | Blog Link

One time pad cipher – Video Link | Blog Link

Hill Cipher – Video Link | Blog Link

Differentiate mono alphabetic and poly alphabetic cipher – Video Link | Blog Link

Transposition techniques:

Columnar Transposition Cipher – Video Link | Blog Link

Rail fence cipher (Zigzag Cipher) – Video Link | Blog Link

Differentiate Substitution cipher and Transposition cipher – Video Link | Blog Link

 

Unit – 2

Stream ciphers and Block ciphers – Video Link | Blog Link

Confusion & Diffusion (Frustrated Statistical Analysis or Claud Shannon Properties) – Video Link | Blog Link

Feistel Cipher Structure (to understand DES) – Video Link | Blog Link

Data Encryption Standard (DES) Algorithm – Video Link | Blog Link

DES Example using Animation – Video Link

Strength & Weakness of DES, Avalanche effect in DES – Video Link | Blog Link

Advanced Encryption Standard (AES) Algorithm with structure – Video Link | Blog Link

AES Introduction – Video Link | Blog Link

Plain text convert into 4x4 matrix in AES – Video Link | Blog Link

AES transformation function:

Sub Bytes – Video Link | Blog Link

Shift Rows – Video Link | Blog Link

Mix Column – Video Link | Blog Link

Add Round Key – Video Link | Blog Link

AES Example using Animation – Video Link

Key expansion in AES – Video Link | Blog Link

 

Unit – 3

Multiple encryptions in DES:

Double DES – Video Link | Blog Link

Triple DES – Video Link | Blog Link

Modes of operation in Block cipher & Applications of Block Cipher Modes – Video Link | Blog Link

Electronic Code Book (ECB Mode) – Video Link | Blog Link

Cipher Block Chaining Mode (CBC Mode) – Video Link | Blog Link

Cipher Feedback mode (CFB Mode) – Video Link | Blog Link

Output Feedback mode (OFB Mode) – Video Link | Blog Link

Counter mode (CTR Mode) – Video Link | Blog Link

 

Unit – 4

Public Key Cryptosystems with Applications – Video Link | Blog Link

Requirements and Cryptanalysis – Video Link | Blog Link

RSA algorithm (Explain with example step by step) – Video Link | Blog Link

Diffie-Hellman Key Exchange algorithm (Explain with example) – Video Link | Blog Link

Man-in-Middle attack in Diffie-Hellman – Video Link | Blog Link

Man-in-the Middle attack in DES – Video Link | Blog Link

 

Unit – 5

Introduction of Hash Function, Properties of Hash Function & Simple Hash Function – Video Link | Blog Link

Applications of Hash Function – Video Link | Blog Link

Requirement and Security of Hash Function – Video Link | Blog Link

Hash functions based on Cipher Block Chaining – Video Link | Blog Link

Secure Hash Algorithm (SHA-1) – Video Link | Blog Link

Message Digest (MD - 5) – Video Link | Blog Link

Difference between SHA 1 & MD 5 – Video Link | Blog Link

 

Unit – 6

Message Authentication Codes – Video Link | Blog Link

MAC based on Hash Functions (HMAC) – Video Link | Blog Link

MAC based on Block Ciphers – Video Link | Blog Link

Difference between hash function and MAC – Video Link | Blog Link

 

Unit – 7

Introduction of Digital Signature & its properties – Video Link | Blog Link

Digital Signature Requirements and security – Video Link | Blog Link

El Gamal & Schnorr Digital Signature Scheme – Video Link | Blog Link

Digital Signature Algorithm (Include RSA approach & Digital Signature Standard) – Video Link | Blog Link

 

Unit – 8

Key management and distribution – Video Link | Blog Link

Symmetric key distribution using symmetric Encryption – Video Link | Blog Link

Symmetric key distribution using asymmetric Encryption – Video Link | Blog Link

Distribution of public keys – Video Link | Blog Link

X.509 Certificate Format – Video Link | Blog Link

Obtain & Revoke X.509 Certificate – Video Link | Blog Link

Public key infrastructure (PKI) – Video Link | Blog Link

 

Unit – 9

Remote user authentication with symmetric encryption – Video Link | Blog Link

Kerberos Protocol terminology, requirement & working – Video Link | Blog Link

Kerberos Version 4 – Video Link | Blog Link

Kerberos Version 4 message exchange – Video Link | Blog Link

Kerberos Realm – Video Link | Blog Link

6 comments:

  1. Replies
    1. You are welcome...Please share with others and follow my blog...
      Subscribe my channel: https://www.youtube.com/channel/UCPEyHmxdc9-eqyC6h66Y6Vw

      Delete
  2. You wrote this post very carefully.network security assignment help The amount of information is stunning and also a gainful article for us. Keep sharing this kind of articles, Thank you.

    ReplyDelete
    Replies
    1. Glad to hear that...!!! Please share with others and follow my blog...

      Delete
  3. sir can you mention the reference here?

    ReplyDelete