1.Security goals
• Security Goals in Info...
2.security attacks
• Security attacks in In...
3.passive attack types
• Passive attack types i...
4.Basic terms in information security
• Basic terms in informa...
5.Caesar cipher
• Caesar cipher(Substitu...
6.Affine cipher
• Affine cipher(Substitu...
7.playfair cipher
• Playfair cipher(Substi...
8.Multiplicative inverse
• Multiplicative inverse...
9.multiplicative cipher encryption
• Multiplicative cipher ...
10.multiplicative cipher decryption
• Multiplicative cipher ...
11.Autokey cipher
• Autokey cipher(Substit...
12.Hill cipher
• Hill cipher(Substituti...
13. Vernam cipher
• Vernam cipher(Substitu...
14. Vigenere cipher
• Vigenere cipher(Substi...
15.Raifence cipher
• Railfence cipher(Trans...
16. Railfence cipher when depth not given
• Railfence cipher when ...
17.Columnar cipher
• Columnar transposition...
18.Gcd of alphabets
• GCD of alphabets(Infor...
19.Euclidean algorithm
• Euclidean Algorithm(In...
20.Extended Euclidean algorithm
• Extended Euclidean alg...
21.Euler's Totient function
• Euler's totient functi...
22.Fermat's Theorem
• Fermats theorem(Inform...
23.Euler's Theorem
• Euler's theorem(Inform...
24 .Chinese Remainder Theorem
• Chinese Remainder Theo...
25)Diffie Hellman Key Exchange Cryptosystem
• Diffie Hellman key exc...
26) Simplified DES(Data Encryption standard)
• Simplified DES(Data En...
27)RSA algorithm
• RSA(Rivest-Shamir-Adle...
28) Elgamal Digital Signature Scheme
• Elgamal Digital signat...
Негізгі бет Simplified DES(Data Encryption Standard)(Information Security)
Пікірлер: 77