+91-9003106272
(9.30 am to 7.30 pm)
Contact Us
About Us
Students
Colleges
Franchisee
Gate Material
Placement Ready Login
Login
Sign up
Login
Sign up
Forgot Password
Forgot User Name
Forgot Password
Forgot User Name
Sign up
Home
Placement Ready
My Choice My Future
Courses
Beat Score
Open Courseware
Study Abroad
Funda Spring
Students
Colleges
Franchisee
GATE ECE
GATE CSE
Anna University - ECE
Anna University - CSE
Search
GATE CSE - Important Keywords
Services
Mechanisms and attacks
OSI
OSI security
OSI security architecture
security model
Network security
Network security model
Classical
Encryption
Encryption techniques
cipher model
cipher
Symmetric cipher
techniques
substitution
substitution techniques
transposition
transposition techniques
steganography
FINITE FIELDS AND NUMBER THEORY
Groups
Rings
Fields
arithmetic
Modular
Euclid s
arithmetic Euclid s
algorithm
Finite fields
Polynomial
Polynomial Arithmetic
Prime
Prime numbers
Fermat s
theorem
Fermat s theorem
Euler s theorem
Euler s
Testing
primality
remainder theorem
Chinese
Chinese remainder theorem
logarithms
Discrete
Discrete logarithms
Encryption
Data Encryption
Data Encryption Standard
cipher
cipher principles
Block cipher principles
block cipher
modes of operation
Encryption Standard
Encryption
Advanced Encryption Standard
DES
Triple DES
Blowfish
RC
algorithm
RC algorithm
Public key
cryptography
Principles of public key
cryptosystems
RSA
RSA algorithm
Key management
Diffie
Hellman Key
Diffie Hellman Key
elliptic curve
Elliptic
exchange Elliptic
arithmetic
curve arithmetic
Elliptic curve
cryptography
Authentication
functions
Authentication requirement
Authentication function
MAC
Hash
Hash function
Hash security
MD
SHA
HMAC
CMAC
signature
Digital signature
protocols
authentication protocols
DSS
Gamal
EI
EI Gamal
Schnorr
Authentication
Authentication applications
Kerberos
X Authentication services
Firewalls
Internet Firewalls
Trusted System
Roles of Firewalls
terminology
Firewall terminology
Firewalls types
Firewall designs
SET
E Commerce
Transactions
Intruder
Intrusion
detection system
Virus
Virus threats
Counter measures
Firewalls design
Firewalls design principles
Trusted systems
Practical implementation
cryptography implementation
security implementation
IP
WEB
WEB SECURITY
SECURITY
Email
Email Security
Security Services
Security Services for Email
Email Services
Email attack
establishing keys
authentication
privacy authentication
Integrity
Message Integrity
repudiation
Non repudiation
Privacy
MIME
S MIME
IP
IP Security
IPSec
IP
IPv
Header
Authentication
Authentication Header
Encapsulation
Payload
Security Payload
Encapsulation Security Payload
ESP
Internet Key
Key Exchange
IKE
Phases of IKE
ISAKMP
IKE
Encoding
Web
Web Security
SSL
TLS
Protocols basics
keys computing
computing
client
client authentication
PKI
SSL
deployed by SSL
SSL Attacks
v3
Exportability
Encoding
Electronic Transaction
Transaction
Secure Electronic Transaction
SET
Gate ECE
Gate CSE
Anna University - CSE
Anna University - ECE
Any Queries, please contact us @ 09677117110 or mail to NPTEL.Bodhbridge@btechguru.com
Distributed under Creative Commons Attribution-Share Alike - CC BY-SA.
Back to top
View Cart & Pay
(
0
)