The app is a complete free handbook of Cryptography or information security which covers important topics, notes, materials, news & blogs on the course. Download the App as a reference material & digital book for computer science, software engineering programs & IT degree courses.
This useful App lists 150 topics with detailed notes, diagrams, equations, formulas & course material, the topics are listed in 5 chapters. The app is must have for all the engineering science students & professionals.
The app provides quick revision and reference to the important topics like a detailed flash card notes, it makes it easy & useful for the student or a professional to cover the course syllabus quickly before an exams or interview for jobs.
Track your learning, set reminders, edit the study material, add favorite topics, share the topics on social media.
Use this useful engineering app as your tutorial, digital book, a reference guide for syllabus, course material, project work, sharing your views on the blog.
Some of the topics Covered in the app are:
1) Basics of Cryptography
2) Conventional cryptography
3) Key management and conventional encryption
4) Keys
5) Pretty Good Privacy
6) Digital signatures
7) Digital certificates
8) The OSI Security Architecture
9) Network Security
10) Types of attacks
11) Denial of service attack
12) Smurf Attack
13) Distributed Denial of Service Attacks
14) Security Mechanism
15) A Model for Network Security
16) Symmetric Ciphers
17) Classical SubstitutionTechniques
18) Classical Transposition Techniques
19) Rotor Machines
20) Steganography
21) Block Cipher Principles
22) The Data Encryption Standard
23) Differential Cryptanalysis Attack
24) Cipher and Reverse Cipher
25) Security of DES
26) The Strength of DES
27) Differential and Linear Cryptanalysis
28) Block Cipher Design Principles
29) Finite Fields
30) The Euclidean Algorithm
31) Finite Fields of The Form GF(p)
32) Polynomial Arithmetic
33) Finite Fields Of the Form GF(2n)
34) The AES Cipher
35) Substitute Bytes Transformation
36) Evaluation Criteria For AES
37) ShiftRows Transformation
38) AddRoundKey Transformation
39) AES Key Expansion Algorithm
40) Equivalent Inverse Cipher
41) Multiple Encryption and Triple DES
42) Triple DES with Two Keys
43) Block Cipher Modes of Operation
44) Cipher Feedback Mode
45) Output Feedback Mode
46) Counter Mode
47) Stream Ciphers