Published On Nov 5, 2021
1.Security goals
• Security Goals in Information Security
2.security attacks
• Security attacks in Information Security
3.passive attack types
• Passive attack types in Information S...
4.Basic terms in information security
• Basic terms in information security
5.Caesar cipher
• Caesar cipher(Substitution cipher) in...
6.Affine cipher
• Affine cipher(Substitution cipher)Inf...
7.playfair cipher
• Playfair cipher(Substitution cipher)I...
8.Multiplicative inverse
• Multiplicative inverse in Information...
9.multiplicative cipher encryption
• Multiplicative cipher encryption(Subs...
10.multiplicative cipher decryption
• Multiplicative cipher decryption(Subs...
11.Autokey cipher
• Autokey cipher(Substitution cipher)In...
12.Hill cipher
• Hill cipher(Substitution cipher)Infor...
13. Vernam cipher
• Vernam cipher(Substitution cipher)Inf...
14. Vigenere cipher
• Vigenere cipher(Substitution cipher)I...
15.Raifence cipher
• Railfence cipher(Transposition cipher...
16. Railfence cipher when depth not given
• Railfence cipher when depth not given...
17.Columnar cipher
• Columnar transposition cipher(Informa...
18.Gcd of alphabets
• GCD of alphabets(Information Security)
19.Euclidean algorithm
• Euclidean Algorithm(Information Secur...
20.Extended Euclidean algorithm
• Extended Euclidean algorithm(Informat...
21.Euler's Totient function
• Euler's totient function(Information ...
22.Fermat's Theorem
• Fermats theorem(Information Security)
23.Euler's Theorem
• Euler's theorem(Information Security)
24 .Chinese Remainder Theorem
• Chinese Remainder Theorem(Information...
25)Diffie Hellman Key Exchange Cryptosystem
• Diffie Hellman key exchange cryptosys...
26) Simplified DES(Data Encryption standard)
• Simplified DES(Data Encryption Standa...
27)RSA algorithm
• RSA(Rivest-Shamir-Adleman) Algorithm(...
28) Elgamal Digital Signature Scheme
• Elgamal Digital signature scheme(Info...