HOME
PARTNERS
CONTACT
Computer Science and Engineering
Introduction
Objective
List of experiments
Target Audience
Course Alignment
Feedback
Introduction
Objective
List of experiments
Target Audience
Course Alignment
Feedback
Cryptography
Breaking the Shift Cipher
Breaking the Mono-alphabetic Substitution Cipher
One-Time Pad and Perfect Secrecy
Message Authentication Codes
Cryptographic Hash Functions and Applications
Symmetric Key Encryption Standards (DES)
Symmetric Key Encryption Standards (AES)
Diffie-Hellman Key Establishment
Public-Key Cryptosystems (PKCSv1.5)
Digital Signatures