Multiplicative inverse in Information security

preview_player
Показать описание
1.Security goals
4.Basic terms in information security
5.Caesar cipher
6.Affine cipher
8.Multiplicative inverse
11.Autokey cipher
12.Hill cipher
13. Vernam cipher
14. Vigenere cipher
15.Raifence cipher
16. Railfence cipher when depth not given
17.Columnar cipher
18.Gcd of alphabets
19.Euclidean algorithm
20.Extended Euclidean algorithm
21.Euler's Totient function
22.Fermat's Theorem
23.Euler's Theorem
24 .Chinese Remainder Theorem
25)Diffie Hellman Key Exchange Cryptosystem
26) Simplified DES(Data Encryption standard)
27)RSA algorithm
28) Elgamal Digital Signature Scheme
Рекомендации по теме