Companies Home Search Profile

Cryptography and System Security

Focused View

Tanmayi Nagale

2:37:43

8 View
  • 1 - Cryptography and its categories.mp4
    03:21
  • 2 - Different types of ciphers Substitution Cipher.mp4
    02:49
  • 3 - Caesar Cipher and Generalized Caesar Cipher.mp4
    16:36
  • 4 - Caesar Cipher Example 2.mp4
    03:16
  • 5 - Affine Cipher.mp4
    12:06
  • 6 - Playfair Cipher.mp4
    08:16
  • 7 - Playfair Cipher Example.mp4
    10:00
  • 8 - Vigenere Cipher Vigenere Table Method.mp4
    03:15
  • 9 - Vigenere Cipher Keyword Method.mp4
    05:57
  • 10 - Transposition Cipher Keyless Transposition Cipher.mp4
    08:49
  • 11 - Transposition Cipher Keyed Transposition Cipher.mp4
    04:35
  • 12 - Key Distribution Center KDC.mp4
    08:37
  • 13 - Diffie Hellman Key Exchange Algorithm.mp4
    05:15
  • 14 - Diffie Hellman Example.mp4
    09:11
  • 15 - RSA AlgorithmSteps.mp4
    02:40
  • 16 - RSA Example1.mp4
    21:10
  • 17 - RSA Example 2.mp4
    05:37
  • 18 - RSA Example 3.mp4
    14:38
  • 19 - Man in the Middle Attack Example.mp4
    11:35
  • Description


    Cryptography Examples

    What You'll Learn?


    • Substitution techniques: Caesar Cipher, Affine Cipher, Vigenere cipher, Playfair cipher
    • Transposition techniques: Keyed and Keyless transposition ciphers
    • Diffie Hellman Key Exchange Algorithm
    • Man in the Middle Attack Example
    • Key Distribution Center (KDC)
    • Public Key Cryptosystem: RSA Algorithm and its examples

    Who is this for?


  • Engineering, Diploma , BSc, MSc
  • What You Need to Know?


  • Mathematics
  • More details


    Description

    These courses is designed to bridge the gap between theoretical cryptography and its practical applications in securing digital communications.

    In the RSA algorithm section, learners are introduced to the foundations of public key cryptography, exploring the RSA algorithm's key generation, encryption, and decryption processes. The course breaks down the complex mathematical concepts underlying RSA, such as prime number theory and modular arithmetic, and provides solved examples to illustrate how RSA secures data transmission.

    The Diffie-Hellman segment delves into the mechanism of secure key exchange over an insecure channel, explaining the mathematical principles that enable this process. It offers practical examples of how Diffie-Hellman is implemented in cryptographic protocols, emphasizing the algorithm's significance in ensuring secure communications.

    Additionally, the course covers MitM attacks, where it elaborates on how attackers intercept communications between two parties to eavesdrop or manipulate messages. Through real-world examples, it showcases the techniques employed in MitM attacks and discusses prevention strategies, underscoring the importance of encryption and secure communication practices.

    These courses combines theoretical knowledge with practical exercises, including solved examples, to equip students with the skills needed to navigate the complex landscape of cybersecurity and cryptography.


    The content focusing on the RSA algorithm, Diffie-Hellman key exchange, and Man in the Middle (MitM) attacks


    Who this course is for:

    • Engineering, Diploma , BSc, MSc

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Tanmayi Nagale
    Tanmayi Nagale
    Instructor's Courses
    Hello Everyone,I warm welcome you all in my course,I hope you will enjoy all the sessionsAssistant Professor at Engineering College, MumbaiI have completed ME IT (Cyber Security)I am Certified Ethical HackerCurrently Pursuing PhD in Computer EngineeringI have 10 Years of Teaching ExperienceThank You
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 19
    • duration 2:37:43
    • Release Date 2024/05/04