Author thumbnail

BECAUSE

Cryptography and Network Security(CB3491)

291,814 views
96 items
Last updated on Jan 1, 2024
public playlist
Introduction to subject
13:42
1.1 Basics of Computer Security Part 1 in Tamil
8:12
1.2. Key Challenges for implementing Security
6:14
1.3. OSI Security Architecture Part 1 in Tamil
15:16
1.4. OSI Security Architecture Part 2 in Tamil
13:32
1.5. Network Security Model in Tamil
9:14
1.7. Classical Encryption Introduction in Tamil
3:53
1.7.1 Caesar Cipher Part 1 in Tamil
21:08
1.7.2 Caesar Cipher Part 2 in Tamil
5:29
1.7.3 Monoalphabetic Cipher in Tamil
10:16
1.7.4 Playfair Cipher Part 1 in Tamil
13:43
1.7.5 Playfair Cipher Part 2 in Tamil
8:47
1.7.6 Basics of Matrix Part 1 in Tamil
20:09
1.7.7 Basics of Matrix Part 2 in Tamil
15:05
1.7.8 Hill Cipher Encryption in Tamil
9:11
1.7.9 Hill Cipher Decryption in Tamil
19:52
1.7.6 Vigenere Cipher in Tamil
13:42
1.7.7 Vernam Cipher in Tamil
12:31
1.7.8 One Time Pad in Tamil
5:07
1.9 Steganography in Tamil
3:42
1.8 Transposition in Tamil
6:37
1.10 Symmetric Cipher in Tamil
11:07
1.11 Cyptanalyst vs Bruteforce in Tamil
3:15
1.12 Modular Inverse Calculation in Tamil
19:47
Modular Inverse in Tamil (Part 2)
9:36
2.1 Introduction to Unit 2 in Tamil
2:09
2.2 Division Algorithm in Tamil
8:08
2.3 Euclidean Algorithm in Tamil
8:49
2.4 Modular Arithmetic in Tamil
12:05
2.5 Groups in Tamil
13:27
2.6 Rings in Tamil
7:14
2.7 Fields in Tamil
6:14
2.8 Finite Fields Part 1 in Tamil
9:38
2.9 Finite Fields Part 2 in Tamil
9:03
2.10 Polynomial Arithmetic  in Tamil
12:55
2.11 Types of Encryption  in Tamil
5:38
2.12 Fiestel Cipher Encryption  in Tamil
16:28
2.13 Fiestel Cipher Decryption in Tamil
3:43
2.14 DES Algorithm in Tamil
15:10
2.15 Strength of DES in Tamil
4:18
2.16 Block Cipher Modes of Operation Part 1 in Tamil
15:34
2.17 Block Cipher Modes of Operation Part 2 in Tamil
17:51
2.18 Summary of  Modes of Operation in Tamil
4:18
2.19 AES Algorithm Introduction in Tamil
12:03
2.20 AES Complete Explanation in Tamil
28:30
2.21 AES Summary in Tamil
7:58
2.22 AES Decryption in Tamil
4:25
2.23 RC4 Algorithm in Tamil
20:35
2.24 Block Cipher Design Principles in Tamil
4:20
3. Unit 3 Introduction in Tamil
1:49
3.1 Primality Testing using Miller Rabin in Tamil
13:07
3.2 Euler Totient Function in Tamil
10:38
3.3 Fermat theorem with proof in Tamil
12:10
3.4 Euler theorem with proof in Tamil
11:03
3.5 Chinese Remainder Theorem Part 1in Tamil
11:11
3.6 Chinese Remainder Theorem Part 2 in Tamil
6:35
3.7 Public Key Cryptography in Tamil
15:43
3.8 RSA Algorithm Encryption and Decryption in Tamil
14:30
3.9 Compute Mod of large exponents in Tamil
11:53
3.10 Security of RSA Algorithm in Tamil
8:33
3.11 Diffie Hellman Key Exchange Algorithm in Tamil
11:14
3.12 Security of Diffie Hellman Key Exchange Algorithm in Tamil
5:14
3.13 Elliptic Arithmetic Part 1 in Tamil
11:54
3.14 Elliptic Arithmetic Part 2 in Tamil
5:50
3.15 Elliptic Curve Cryptography in Tamil
3:58
4.1 Syllabus Discussion in Tamil
2:27
4.2 Message Authentication in Tamil
9:57
4.3 Message Encryption Part 1 in Tamil
14:21
4.4 Message Encryption Part 2 in Tamil
6:29
4.5 Message Authentication Code(MAC) Part 1 in Tamil
15:10
4.6 Message Authentication Code(MAC) Part 2 in Tamil
16:38
4.7 Hashed Message Authentication Code(HMAC)  in Tamil
14:12
4.8 Cipher Message Authentication Code(CMAC)  in Tamil
13:49
4.9.1 Secure Hash Algorithm Part 1  in Tamil
7:39
4.9.2 Secure Hash Algorithm Part 2  in Tamil
14:13
4.9.3 Secure Hash Algorithm Part 3  in Tamil
15:16
4.10 Digital Signature Basics  in Tamil
9:00
4.11 Digital Signature Scheme  in Tamil
14:13
4.12 Elgammal Digital Signature Scheme  in Tamil
15:55
4.13 Schnorr Digital Signature Scheme  in Tamil
15:23
4.14 Symmetric Key Distribution using Symmetric Encryption Part 1  in Tamil
16:02
4.15 Symmetric Key Distribution using Symmetric Encryption Part 2  in Tamil
20:26
4.16 Symmetric Key Distribution using Asymmetric Encryption in Tamil
14:29
4.17 Distribution of Keys in Tamil
16:47
4.18 Entity Authentication in Tamil
7:16
4.19 Biometrics and its types in Tamil
9:37
4.20 Passwords Part 1 in Tamil
14:22
4.21 Passwords Part 2 in Tamil
9:01
4.22 Challenge Responses in Tamil
12:27
4.23 Kerberos in Tamil
14:54
4.24. X 509 Certificate in Tamil
19:20
5.1 Classification of Cyber Crimes Part 1 in Tamil
10:20
5.2 Classification of Cyber Crimes Part 2 in Tamil
14:24
5.3 Password Cracking in Tamil
9:25
5.4 Keyloggers and Spywares in Tamil
7:50
5.5 SQL Injection Attack in Tamil
6:24