Professional Documents
Culture Documents
Lecture - 1 Crypto
Lecture - 1 Crypto
Cryptography
(Lab-1)
Dr.Saurabh Rana
,
Duration and Credit
3 Credits (2-0-2)(L-T-P)
Modern Cryptography NA
COURSE TITLE PRE-REQUISITES
Certification Mapping:
https://www.coursera.org/learn/crypto2
https://www.coursera.org/learn
/introduction-to-applied-cryptography
Books
Text Book:
Reference Book:
Suggested Reading:
https://www.amazon.in/Cryptography-Network-Security-Principles-Practice/dp/933258
5229/ref=sr_1_1?crid=3LA589AFCCQR6&keywords=william+stallings+cryptography
+and+network+security&qid=1673450854&sprefix=william+stalling%2Caps%2C436
&sr=8-1
Continuous Assessment and Grading Policy
Important Notes:
Students having any problem related to the course (e.g., not able to understand,
requires extra attention) are suggested to discuss their problems with me in the
office hours or by writing an email. All the necessary help will be provided.
1976
1. Whitfield Diffie
2. Martin Hellman
3. Ralph Merkle
Widely Used Cryptosystem
Asymmetric Cryptography
Applications giving rise in modern cryptography
Application
1. Alice
Bob Alice
2. Bob
3. Oscar(Bad Guy)
Oscar
Communication Channel
Insecure Channel
Cont…
Future in cryptography
Cont…
https://www.youtube.com/shorts/-uD6_yj
HrvY