Friday, 6 May 2016

Network & Web Security Unit 2 (Cryptography)

Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, DiffieHellman key exchange, elliptic curve cryptography.


  1. Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security, Storage solutionsColocation Service Providers in Chennai

  2. This content has a great information. So informative.

  3. I would request the readers to go through this encryption everywhere program initiated by Symantec and a company, JNR Management. It tells users about the combine mission of Symantec and JNR Management.