My Courses
Login
Join for Free
Lecture
Enroll
Mod-01 Lec-23 Cryptographic Hash Functions
Home
Indian Institute of Technology Kharagpur
Cryptography and Network Security
Mod-01 Lec-23 Cryptographic Hash Functions
Course Lectures
Mod-01 Lec-01 Introduction
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-02 Overview on Modern Cryptography
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-03 Introduction to Number Theory
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-04 Probability and Information Theory
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-05 Classical Cryptosystems
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-06 Cryptanalysis of Classical Ciphers
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-07 Shannons Theory
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-08 Shannon's Theory (Contd)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-09 Shannon's Theory (Contd)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-10 Symmetric Key Ciphers
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-11 Block Cipher Standards (DES)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-12 Block Cipher Standards (AES)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-13 Block Cipher Standards (AES) (Contd.)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-14 Linear Cryptanalysis
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-15 Differential Cryptanalysis
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-16 Few other Cryptanalytic Techniques
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-17 Overview on S-Box Design Principles
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-18 Modes of Operation of Block Ciphers
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-19 Stream Ciphers
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-20 Stream Ciphers (Contd...1)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-21 Stream Ciphers (Contd...2)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-22 Pseudorandomness
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-23 Cryptographic Hash Functions
Dr. Debdeep Mukhopadhyay
Playing
Mod-01 Lec-24 Cryptographic Hash Functions (Contd...1)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-25 Cryptographic Hash Functions (Contd...2)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-26 Message Authentication Codes
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-27 More Number Theoretic Results
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-28 The RSA Cryptosystem
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-29 Primality Testing
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-30 Factoring Algorithms
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-31 Some Comments on the Security of RSA
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-32 Discrete Logarithm Problem (DLP)
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-33 The Diffie-Hellman Problem and Security of ElGamal Systems
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-34 An Introduction to Elliptic Curve Cryptography
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-35 Application of Elliptic Curves to Cryptography
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-36 Implementation of Elliptic Curve Cryptography
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-37 Secret Sharing Schemes
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-38 A Tutorial on Network Protocols
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-39 System Security
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-40 Firewalls and Intrusion Detection Systems
Dr. Debdeep Mukhopadhyay
Play
Mod-01 Lec-41 Side Channel Analysis of Cryptographic Implementations
Dr. Debdeep Mukhopadhyay
Play