Cybersecurity

1.Substitution cipher, classification of Attacks

post-thumbnail

2.Modular Arithmetic, ultiplicative Inverse, Shift & Affine Cipher

post-thumbnail

3.Stream Cipher, Random Number Generator

post-thumbnail

4.DES (Data Encryption Standard)

post-thumbnail

5.AES Basic, GF(Galois Field)

post-thumbnail

6.AES Architecture

post-thumbnail

7.Block Ciphers , ECB, CBC

post-thumbnail

8.OFB, 2DES, 3DES

post-thumbnail

9.Euclidean algorithm, RSA

post-thumbnail

10.Square-and-Multiply algorithm, Diffie-Hellman Key Exchange

post-thumbnail

11.Review of DLP

post-thumbnail

12.Cyber HW

post-thumbnail

13.Mid Term Example

post-thumbnail