Cryptography & N/W Security: #18 Playfair, Vignere, Hill, One time pad Polyalphabetic Ciphers
Shreya's E-Learning
Cryptography & N/W Security: #18 Playfair, Vignere, Hill, One time pad Polyalphabetic Ciphers
14:49
Cryptography & Network Security: #17 Polyalphabetic Cipher and its type Autokey Cipher
Shreya's E-Learning
Cryptography & Network Security: #17 Polyalphabetic Cipher and its type Autokey Cipher
7:11
Cryptography and Network Security: #16 Affine Cipher
Shreya's E-Learning
Cryptography and Network Security: #16 Affine Cipher
9:37
Cryptography and Network Security: #15 Multiplicative Cipher
Shreya's E-Learning
Cryptography and Network Security: #15 Multiplicative Cipher
10:56
Cryptography and Network Security: #14 Multiplicative Inverse
Shreya's E-Learning
Cryptography and Network Security: #14 Multiplicative Inverse
6:10
Cryptography and Network Security: #13 Euler's Theorem
Shreya's E-Learning
Cryptography and Network Security: #13 Euler's Theorem
6:51
Cryptography and Network Security: #12 Fermat's Little Theorem
Shreya's E-Learning
Cryptography and Network Security: #12 Fermat's Little Theorem
4:25
Cryptography and Network Security: #11 Euler's Phi Function
Shreya's E-Learning
Cryptography and Network Security: #11 Euler's Phi Function
9:06
Cryptography and Network Security:#10 Cryptanalysis for Additive Ciphers
Shreya's E-Learning
Cryptography and Network Security:#10 Cryptanalysis for Additive Ciphers
7:35
Cryptography and Network Security:#9 Traditional Ciphers: Additive Substitution Cipher
Shreya's E-Learning
Cryptography and Network Security:#9 Traditional Ciphers: Additive Substitution Cipher
11:53
Cryptography and Network Security:#8 Symmetric Key Ciphers
Shreya's E-Learning
Cryptography and Network Security:#8 Symmetric Key Ciphers
9:35
Cryptography and Network Security: #7 Security Services and Mechanisms
Shreya's E-Learning
Cryptography and Network Security: #7 Security Services and Mechanisms
12:07
Cryptography and Network Security: #6 Cryptographic Attacks
Shreya's E-Learning
Cryptography and Network Security: #6 Cryptographic Attacks
10:35
Cryptography and Network Security: #5 Multiplicative Inverse using Extended Euclidean Algo Part 2
Shreya's E-Learning
Cryptography and Network Security: #5 Multiplicative Inverse using Extended Euclidean Algo Part 2
9:02
Cryptography and Network Security: #4 Inverses(Additive Inverse, Multiplicative Inverse) Part 1
Shreya's E-Learning
Cryptography and Network Security: #4 Inverses(Additive Inverse, Multiplicative Inverse) Part 1
11:05
Cryptography and Network Security: #3 Operations in Zn and Properties
Shreya's E-Learning
Cryptography and Network Security: #3 Operations in Zn and Properties
9:37
Cryptography and Network Security: #2 Modulo Arithmetic and Basic Concept
Shreya's E-Learning
Cryptography and Network Security: #2 Modulo Arithmetic and Basic Concept
10:04
Cryptography and Network Security: #1 Extended Euclidean Algorithm with solved example (GCD)
Shreya's E-Learning
Cryptography and Network Security: #1 Extended Euclidean Algorithm with solved example (GCD)
11:01