Network Security / Cryptography / Information Security

Network Security Most IMP Topics for GTU Exam - Click Here

Unit – 1

Basic Terms of Network Security - Video Link | Blog Link

Network Security Model – Video Link | Blog Link

CIA Triangle (Security Services) – Video Link | Blog Link

Symmetric Cipher Model (Symmetric key cryptography) – Video Link | Blog Link

Asymmetric Cipher Model (Asymmetric key cryptography) – Video Link | Blog Link

Differentiate Symmetric and Asymmetric Key Cryptography – Video Link | Blog Link

Types of Attack: Blog Link

Active Attack – Video Link | Blog Link

Passive Attack – Video Link | Blog Link

Differentiate active attack and passive attack – Video Link | Blog Link

Substitution Cipher:

Caesar cipher – Video Link | Blog Link

Monoalphabetic Cipher – Video Link | Blog Link

Play fair cipher – Video Link | Blog Link

Vigenère Cipher (Polyalphabetic Cipher) – Video Link | Blog Link

One time pad cipher – Video Link | Blog Link

Hill Cipher – Video Link | Blog Link

Differentiate mono alphabetic and poly alphabetic cipher – Video Link | Blog Link

Transposition techniques:

Columnar Transposition Cipher – Video Link | Blog Link

Rail fence cipher (Zigzag Cipher) – Video Link | Blog Link

Differentiate Substitution cipher and Transposition cipher – Video Link | Blog Link

 

Unit – 2

Stream ciphers and Block ciphers – Video Link | Blog Link

Confusion & Diffusion (Frustrated Statistical Analysis or Claud Shannon Properties) – Video Link | Blog Link

Feistel Cipher Structure (to understand DES) – Video Link | Blog Link

Data Encryption Standard (DES) Algorithm – Video Link | Blog Link

DES Example using Animation – Video Link

Strength & Weakness of DES, Avalanche effect in DES – Video Link | Blog Link

Advanced Encryption Standard (AES) Algorithm with structure – Video Link | Blog Link

AES Introduction – Video Link | Blog Link

Plain text convert into 4x4 matrix in AES – Video Link | Blog Link

AES transformation function:

Sub Bytes – Video Link | Blog Link

Shift Rows – Video Link | Blog Link

Mix Column – Video Link | Blog Link

Add Round Key – Video Link | Blog Link

AES Example using Animation – Video Link

Key expansion in AES – Video Link | Blog Link

 

Unit – 3

Multiple encryptions in DES:

Double DES – Video Link | Blog Link

Triple DES – Video Link | Blog Link

Modes of operation in Block cipher & Applications of Block Cipher Modes – Video Link | Blog Link

Electronic Code Book (ECB Mode) – Video Link | Blog Link

Cipher Block Chaining Mode (CBC Mode) – Video Link | Blog Link

Cipher Feedback mode (CFB Mode) – Video Link | Blog Link

Output Feedback mode (OFB Mode) – Video Link | Blog Link

Counter mode (CTR Mode) – Video Link | Blog Link

 

Unit – 4

Public Key Cryptosystems with Applications – Video Link | Blog Link

Requirements and Cryptanalysis – Video Link | Blog Link

RSA algorithm (Explain with example step by step) – Video Link | Blog Link

Diffie-Hellman Key Exchange algorithm (Explain with example) – Video Link | Blog Link

Man-in-Middle attack in Diffie-Hellman – Video Link | Blog Link

Man-in-the Middle attack in DES – Video Link | Blog Link

 

Unit – 5

Introduction of Hash Function, Properties of Hash Function & Simple Hash Function – Video Link | Blog Link

Applications of Hash Function – Video Link | Blog Link

Requirement and Security of Hash Function – Video Link | Blog Link

Hash functions based on Cipher Block Chaining – Video Link | Blog Link

Secure Hash Algorithm (SHA-1) – Video Link | Blog Link

Message Digest (MD - 5) – Video Link | Blog Link

Difference between SHA 1 & MD 5 – Video Link | Blog Link

 

Unit – 6

Introduction of Message Authentication Code (MAC) | Application of MAC – Video Link | Blog Link

MAC based on Hash Functions (HMAC) – Video Link | Blog Link

MAC based on Block Ciphers – Video Link | Blog Link

Difference between hash function and MAC – Video Link | Blog Link

 

Unit – 7

Introduction of Digital Signature & its properties – Video Link | Blog Link

Digital Signature Requirements and security – Video Link | Blog Link

El Gamal & Schnorr Digital Signature Scheme – Video Link | Blog Link

Digital Signature Algorithm (Include RSA approach & Digital Signature Standard) – Video Link | Blog Link

 

Unit – 8

Key management and distribution – Video Link | Blog Link

Symmetric key distribution using symmetric Encryption – Video Link | Blog Link

Symmetric key distribution using asymmetric Encryption – Video Link | Blog Link

Distribution of public keys – Video Link | Blog Link

X.509 Certificate Format – Video Link | Blog Link

Obtain & Revoke X.509 Certificate – Video Link | Blog Link

Public key infrastructure (PKI) – Video Link | Blog Link

 

Unit – 9

Remote user authentication with symmetric encryption – Video Link | Blog Link

Kerberos Protocol terminology, requirement & working – Video Link | Blog Link

Kerberos Version 4 – Video Link | Blog Link

Kerberos Version 4 message exchange – Video Link | Blog Link

Kerberos Realm – Video Link | Blog Link


Unit – 10

Web Security Threats and Approaches – Video Link | Blog Link

SSL (Secure Socket Layer) – Video Link | Blog Link

HTTPS – Video Link | Blog Link

SSH – Video Link | Blog Link

24 comments:

  1. Replies
    1. You are welcome...Please share with others and follow my blog...
      Subscribe my channel: https://www.youtube.com/channel/UCPEyHmxdc9-eqyC6h66Y6Vw

      Delete
  2. You wrote this post very carefully.network security assignment help The amount of information is stunning and also a gainful article for us. Keep sharing this kind of articles, Thank you.

    ReplyDelete
    Replies
    1. Glad to hear that...!!! Please share with others and follow my blog...

      Delete
  3. sir can you mention the reference here?

    ReplyDelete
  4. Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you Best Commercial Property Security services Adelaide service provider.

    ReplyDelete
    Replies
    1. Thank you... Please share with others and follow my blog

      Delete
  5. sir please upload blog of kerberos V 5

    ReplyDelete
  6. great articles.. thanks.. it helped me alot bcz i am in gtu university

    ReplyDelete
  7. This comment has been removed by the author.

    ReplyDelete
  8. Comparta gran información sobre su blog, Blog realmente útil para nosotros.
    comprar cialis generico

    ReplyDelete
  9. Impressive and powerful suggestion by the author of this blog are really helpful to me.
    antivirus protection brisbane

    ReplyDelete
  10. Nice and interesting information and informative too.
    Excavator hire

    ReplyDelete
  11. You wrote an extremely useful article Network Security and Protection Solution Atlanta. I gleaned some useful information from this article. Many thanks for writing about it. I wish you continued success.

    ReplyDelete
  12. I am grateful to this blog site providing special as well as useful understanding concerning this subject.
    Darwin movers

    ReplyDelete
  13. I am thankful to this blog giving unique and helpful knowledge about this topic.
    buying a secondhand iPhone

    ReplyDelete
  14. This comment has been removed by the author.

    ReplyDelete
  15. With the assistance of such countless various kinds of security instruments which are accessible nowadays, it has become exceptionally simple to ensure that the homes are no problem at all.
    alphasecuritemontreal.com

    ReplyDelete
  16. Excellent knowledge, You are providing important knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Read more info about Network Security Services

    ReplyDelete