ADVERTISEMENT
ADVERTISEMENT

Cryptography Tutorials

Cryptography is a method of protecting information and communications through the coding so that only those for whom the information is intended can read and process it.

In computer science, cryptography is used for securing the information and communication techniques derived from mathematical concepts and algorithms, to transform messages in ways that are hard to decipher. These algorithms are used for various cryptography techniques such as cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions and email.

Cryptography Topics Index

  1. Introduction to Cryptography
  2. Types of Cryptography: Symmetric and Asymmetric
  3. Cryptography: Caesar Cipher and its Python Implementations
  4. Substitution Techniques and its types | Cryptography
  5. Cryptographic Techniques: Vigenére Cipher, Playfair Cipher, Hill Cipher
  6. Cryptography Transposition Techniques
  7. Playfair Cipher in Cryptography
  8. Feistel Cipher in Cryptography
  9. Hill Cipher in Cryptography
  10. Diffie Hellman Algorithm in Cryptography
  11. Rail Fence Cipher in Cryptography
  12. Elliptic Curve Cryptography
  13. Message-Digest Algorithm 5 (MD5) in Cryptography
  14. Security goals, security attacks and principles of security | Cryptography
  15. Difference between Stream Ciphers and Block Ciphers in Cryptography
  16. Caesar Cipher in Cryptography
  17. Vigenere Cipher in Cryptography
  18. Vernam Cipher in Cryptography
  19. One Time Pad Cipher in Cryptography
  20. Hash Function in Cryptography
  21. Applications of Hash Function in Cryptography
  22. Digital Signatures in Cryptography
  23. Mode of Operation in Cryptography
  24. Electronic Code Book (ECB) in Cryptography
  25. Cipher Block Chaining (CBC) in Cryptography
  26. Ciphertext Feedback (CFB) in Cryptography
  27. Output Feedback Mode (OFB) in Cryptography
  28. Counter (CTR) Mode in Cryptography
  29. Rivest-Shamir-Adleman (RSA) in Cryptography
  30. Advanced Encryption Standard in Cryptography
  31. Data Encryption Standard (DES) in Cryptography
  32. Digital Signature Algorithm (DSA) in Cryptography
  33. International Data Encryption Algorithm (IDEA) in Cryptography
  34. Multiple DES in Cryptography
  35. Birthday Attack in Cryptography
  36. Boomerang Attack in Cryptography
  37. Quantum Cryptography
  38. MAC-based on Hash Function (HMAC) in Cryptography
  39. MCQ

    More Cryptography MCQs ...

ADVERTISEMENT



ADVERTISEMENT



Comments and Discussions


ADVERTISEMENT

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© https://www.includehelp.com some rights reserved.