â´ Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.â´
âē This App is meant for students of computer science who aspire to learn the basics of cryptography. It will be useful for networking professionals as well who would like to incorporate various cryptographic algorithms to ensure secure data communication over their networks.âĻ
ãTopics Covered in this App are Listed Belowã
âĸ Origin of Cryptography
âĸ Modern Cryptography
âĸ Cryptosystems
âĸ Attacks On Cryptosystems
âĸ Traditional Ciphers
âĸ Modern Symmetric Key Encryption
âĸ Block Cipher
âĸ Feistel Block Cipher
âĸ Data Encryption Standard
âĸ Triple DES
âĸ Advanced Encryption Standard
âĸ Block Cipher Modes of Operation
âĸ Public Key Encryption
âĸ Data Integrity in Cryptography
âĸ Cryptography Hash functions
âĸ Message Authentication
âĸ Cryptography Digital signatures
âĸ Public Key Infrastructure
âĸ Cryptography Benefits & Drawbacks
âĸ Introduction to The Definition of Cryptography
âĸ Introduction to What is cryptocurrency, how does it work and why do we use it?
âĸ Introduction to What types of cryptography are there?
âĸ Introduction to Types Of Cryptographic Algorithms
âĸ Introduction to Purpose Of Cryptography
âĸ Introduction to Cryptographic primitives and protocols
âĸ Introduction to Cryptography Terminology
âĸ Introduction to What are the Different Types of Encryption Methods?
âĸ Introduction to Types of Encryption
âĸ Introduction to 5 Common Encryption Algorithms and the Unbreakables of the Future
âĸ Introduction to Different types of Symmetric key Cryptography
âĸ Introduction to Types of Cryptosystem
âĸ Introduction to Cryptography - The Science of Secrecy
âĸ Introduction to Frequency analysis
âĸ Introduction to Crypto Wars
âĸ Introduction to Strong cryptography
âĸ Introduction to The Pre-history of Encryption
âĸ Introduction to Notions of Security
âĸ Introduction to Public Key Cryptography (PKC)
âĸ Introduction to Controlled Cryptographic Item (CCI)
âĸ Introduction to Cryptoanarchism
âĸ Introduction to Public Key Cryptography Standards (PKCS)
âĸ Introduction to Cryptosecurity
âĸ Introduction to The Data Encryption Standard (DES)
âĸ Introduction to Public key cryptography:
âĸ Introduction to The Mathematics of the RSA Public-Key Cryptosystem
âĸ Introduction to PAST, PRESENT, AND FUTURE METHODS OF CRYPTOGRAPHY AND DATA ENCRYPTION
âĸ Introduction to Symmetric and Asymmetric Encryption
âĸ Introduction to THE ENCRYPTION/DECRYPTION CHANNEL
âĸ Introduction to COMPUTATIONAL COMPLEXITY AND ASYMMETRIC ENCRYPTION
âĸ Introduction to The Knapsack Trapdoor
âĸ Introduction to Secure communication
âĸ Introduction to Cryptography and Steganography â A Survey
âĸ Introduction to DEFINITION & TERMINOLOGY
âĸ Introduction to STEGANOGRAPHY
āĻāĻĒāĻĄā§âāĻ āĻā§°āĻž āϤāĻžā§°āĻŋāĻ
⧧⧍-ā§§ā§Ļ-⧍ā§Ļ⧍⧍