Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Swayam

Cryptography

Punjabi University and CEC via Swayam

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Cryptography is essentially the science of writing in secret code. In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality, integrity, and non-repudiation. To meet these security requirements, we employ secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.In the first part of the course, we will review a number of different ciphers that were used before World War II. These ciphers would be easily broken nowadays, since cryptography has advanced quickly over the past couple of decades with the advent of modern computers. We will cover block cipher algorithms and describe the advanced encryption standard for a symmetric-key encryption. We will also learn about the important MD5 and SHA-1 hash functions as well as the message authentication code.This course will focus on public key cryptography, which is best exemplified by the RSA algorithm We will also learn about elliptic curves, another important mathematical function in cryptography.In the final part of the course, we will have anoverview and discussion of public key infrastructure.

Syllabus

Prof. Rajesh Kumar Bawa has done Ph.D in the area of Numerical Computing from IIT Kanpur in 1994.

He is having more than 25 years of teaching and Research at various Institutes. Presently, he is a Senior Professor and former Head, Department of Computer Science, Punjabi University, Patiala. Before this, he also served SLIET, Longowal ( Deemed University) and Thapar University at Patiala.

His present areas of interest are Discrete Mathematical Structures for Computer Science, Computer Graphics, Digital Image Processing, Cloud Computing, Parallel and Scientific Computing.

He has guided 8 PhD students and presently 8 research scholars are pursuing their Ph.D’s under his supervision. Also he has guided around 70 M.Tech thesis also.

He has published many research papers in journals of reputed publishers such as Elsevier, Springer, Taylor and Francis etc

He has presented papers inmany international and national conferences.

Also he chaired many sessions in these conferences. He chaired a session in an International conferencesof Computer Scientists and Engineers at Hong Kong and organized a session in an international Conference at Illinous Institute of Technology, Chicago, USA.

He isalso Guest Editor of International journal of Neural, Parallel and Scientific Computation published by Dynamic Publishers, USA

Taught by

Rajesh Kumar Bawa

Tags

Reviews

Start your review of Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.