2023 2024 EduVark > Education Discussion > General Discussion


  #1  
July 16th, 2016, 08:09 AM
Unregistered
Guest User
 
Cryptography IIT Bombay

I am planning to do Cryptography course from Indian Institute of Technology Bombay (IITB) and want course details. Will you please provide me course content of this course so that I get to know list of topics I have to study also provide me address and contact details of IITB?
Similar Threads
Thread
IISC Cryptography
Cryptography IIT Bombay
Cryptography and Network Security UPTU Paper
IIT Bombay Jam
Cryptography VTU
Indian Institute Of Technology Bombay (IIT Bombay)
IIT Bombay To BCT
Elitmus Cryptography
XPS IIT Bombay
KPK IIT Bombay
Institute of Cryptography Communication and Informatics
IIT Bombay cryptography
Cryptography Indian Statistical Institute
Cryptography Research Group ISI Kolkata
Cryptography IIT Kharagpur

  #2  
July 16th, 2016, 09:06 AM
Super Moderator
 
Join Date: Mar 2012
Re: Cryptography IIT Bombay

The Indian Institute of Technology Bombay (IITB or IIT Bombay) is a public engineering and research institution located in Powai, Mumbai.

Cryptography course content of IIT Bombay:

The contents of the course are listed below.

Introduction
Cyber Attacks
Defense strategies and techniques

Computer Networking Primer
Introduction to LANs, IPv4, IPv6, ICMP, TCP/UDP, DNS, HTTP, etc.

Mathematical Background for Cryptography
Modulo Arithmetic
GCD (Euclids Algorithm)
Algebraic Structures (Groups)
Chinese Remainder Theorem

Basics of Cryptography
Elementary Ciphers (Substitution, Transposition and their Properties)

Secret Key Cryptography
DES (Data Encryption Standard)
MAC (Message Authentication Codes) and other applications
Attacks

Public Key Cryptography
RSA
Performance
Practical Issues
PKCS (Public Key Cryptography Standard)

Cryptographic Hash
Properties, Applications, Performance
Birthday Attack

Key Management
Digital Certificates
PKI (Public Key Infrastructure)

Authentication
One-Way Authentication
Mutual Authentication
Dictionary Attacks
Centralized Authentication
The Needham-Schroeder Protocol
Kerberos
Non-cryptographic Protocol Vulnerabilities
DoS and DDoS
Session Highjacking and Spoofing
ARP Spoofing and Attacks on DNS

Viruses, Worms, and other Malware
Virus and Worm Features
Internet Scanning Worms
Mobile Malware and Botnets

Access Control in Operating Systems
Discretionary Access Control
Mandatory Access Control
Role Based Access Control
SELinux and Recent Trends

Address:

IIT Mumbai

Powai, Mumbai, Maharashtra 400076

Phone: 022 2572 2545


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 08:02 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8