Lesson 8 of 16 • 2 upvotes • 8:20mins
Basic Substitution Techniques
16 lessons • 2h 43m
Overview of the Course
4:15mins
Lesson 1- History, Challenges and Objectives
14:40mins
Lesson 2- Security Architecture and Attacks
12:58mins
Lesson 3- Security Services
13:54mins
Lesson 4- Security Mechanism
8:52mins
Lesson 5 - Cryptosystem
9:46mins
Lesson 6- Cryptanalysis and Brute-Force Attacks
9:22mins
Lesson 7- Substitution Techniques
8:20mins
Lesson 8- Monoalphabetic and Polyalphabetic
9:42mins
Lesson 9- Transposition Cipher
10:02mins
Lesson 10- One Time Pad and Steganography
9:33mins
Lesson 11- Block Cipher
8:28mins
Lesson 12 - Feistel Block Cipher
9:05mins
Lesson 13 - Data Encryption Standard (DES)
9:31mins
Lesson 14- DES Analysis
12:48mins
Lesson 15- Block Cipher Modes of Operation
12:07mins