Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    A To Z Of Cryptography

    Posted By: ELK1nG
    A To Z Of Cryptography

    A To Z Of Cryptography
    Published 12/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.96 GB | Duration: 6h 23m

    Practical Hands-on with Python Programming

    What you'll learn

    Concept of Network Security, Services and Mechanisms

    Malware

    Symmetric Key Cryptographic techniques

    Asymmetric Key Cryptographic Techniques

    Hands on with Python Programming for several cryptographic algorithms

    Requirements

    Basic knowledge of computer networks

    Programming experience of Python

    Basic knowledge of mathematics

    Description

    This a detailed course on Cryptography, which is a way to secure important information and communication through codes. These codes are only available to the rightful owner and hence it can be used to combat attacks, and protect your data from hackers. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Network security is a comprehensive aspect that shelters a multitude of technologies, devices and processes involved in computer networks. With the advent of Internet and world wide web our interconnected computers are prone to threats and attacks through the system vulnerabilities and this in turn can hamper the activities of an organization or even an individual. In its simplest term, network security comprises a set of rules and configurations designed to protect the confidentiality, integrity and availability of computer networks and data using both software and hardware technologies. There are several reasons to learn network security and cryptography.In our everyday lives, cryptography is used extensively and is ubiquitous. Say for example, we may use it to securely shoot passwords over massive networks for online shopping. It is used in financial transaction in banks where Bank servers and e-mail clients save your passwords using cryptography. Cryptography is used to secure all transmitted information in our IoT-connected world, to authenticate people and devices, and devices to other devices.In this course I will take you through a tour of various cryptographic techniques.There are basically 2 types of cryptographic systems. Symmetric key cryptosystem and asymmetric key cryptosystem. In symmetric key cryptosystem there is a single key used for encryption as well as decryption. In asymmetric key cryptosystem, there is a pair of keys- one used for encryption and the other for decryption. Encryption is the process of converting the plaintext or original message to ciphertext or coded message whereas decryption converts the ciphertext back to plaintext. So, encryption is used at the sender side whereas decryption is used at the receiver side. Towards the end of the course some complex research related cryptographic topics have been discussed that will be beneficial to the researchers and advanced learners.

    Overview

    Section 1: Introduction to Network Security

    Lecture 1 About the Section on Introduction to Network Security

    Lecture 2 1.1 Introduction

    Lecture 3 1.2 Network Attacks

    Lecture 4 1.3 Network Security Services

    Lecture 5 1.4 Malware Types Part 1

    Lecture 6 1.5 Malware Types Part 2

    Lecture 7 1.6 Malware Spread

    Lecture 8 1.7 Malware Protection

    Lecture 9 1.1 Hands-on Malware Analysis

    Section 2: Cryptography Part 1

    Lecture 10 Overview of Section 2

    Lecture 11 2.1 Classical Cryptosystem

    Lecture 12 2.1 Hands-on with Python-Caesar Cipher, Reverse Cipher, Caesar Hacker, ROT13

    Lecture 13 2.2 Playfair Cipher

    Lecture 14 2.2 Hands-on with Python-Playfair Cipher

    Lecture 15 2.3 Single Round Function

    Lecture 16 2.4 Data Encryption Standard (DES)

    Lecture 17 2.3 Hands-on with Python-DES

    Lecture 18 2.5 Substitution Cipher-Hill Cipher

    Lecture 19 2.4 Hands-on with Python-Hill Cipher

    Lecture 20 2.6 Substitution Cipher-Vigenere Cipher

    Lecture 21 2.5 Hands-on with Python-Vigenere Cipher

    Lecture 22 2.7 Transposition Cipher-Rail Fence

    Lecture 23 2.8 Transposition Cipher-Advanced Rail Fence

    Lecture 24 2.6 Hands-on with Python-Rail Fence

    Section 3: Cryptography Part 2

    Lecture 25 Overview of Section 3

    Lecture 26 3.1 IDEA

    Lecture 27 3.2 RC5

    Lecture 28 3.3 MAC

    Lecture 29 3.4 Hash Basics

    Lecture 30 3.5 Hash Design

    Lecture 31 3.6 Hash Applications

    Lecture 32 3.2 Hands-on with Python-SHA

    Lecture 33 3.7 MD5 Steps

    Lecture 34 3.8 MD5 Architecture

    Lecture 35 3.9 MD5 Implementation Steps

    Lecture 36 3.3 Hands-on with Python-MD5

    Lecture 37 3.10 Public Key Cryptosystem - RSA

    Lecture 38 3.4 Hands-on with Python - RSA

    Lecture 39 3.11 Diffie Hellman

    Lecture 40 3.12 Primitive Roots

    Lecture 41 3.5 Hands-on Diffie Hellman

    Section 4: Advanced Research Topics on Cryptography

    Lecture 42 Overview of Section 4

    Lecture 43 4.1 AES

    Lecture 44 4.1 Hands-on with Python-AES

    Lecture 45 4.2 RC4

    Lecture 46 4.2 Hands-on with Python-RC4

    Lecture 47 4.3 Blowfish Algorithm

    Lecture 48 4.4 Quantum Cryptography

    Lecture 49 4.5 One Time Password (OTP)

    Lecture 50 4.6 Birthday Attack

    Lecture 51 4.7 DNA Cryptography

    Lecture 52 4.8 Image Steganography in Cryptography

    Anybody interested in the area of network security and cryptography, especially students of undergraduate and postgraduate courses of computer science as well as research scholars