0% found this document useful (0 votes)
55 views5 pages

CNS PDF

Uploaded by

Yogesh Singla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views5 pages

CNS PDF

Uploaded by

Yogesh Singla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Topic Wise Content for Subject CNS 6th Sem

Click on link for related topic video or notes


S.No Topic Name Link 1 Link 2 Link 3
https://www.youtube.com/ https://www.youtube.com/
watch?v=eMHcQByhR- watch?v=QjSWXj4gKBw&list
1 Simple DES, g&list=PL9FuOtXibFjV77w2e =PLV8vIYTIdSnYazIVgQkws7
yil4Xzp8eooqsPp8&index=2 MqhiMaW-
0 ocN&index=31&t=0s
https://www.geeksforgeeks.
2 DES – Modes of operation, https://www.youtube.com/ org/block-cipher-modes-of-
watch?v=On_OMBf2j6E operation/
https://www.youtube.com/
https://www.youtube.com/ watch?v=rdtF9pfv6AM&list=
3 Triple DES, watch?v=_zldFlu7tCM&list=PLV8vIYTIdSnYazIVgQkws7M
PL9FuOtXibFjV77w2eyil4XzpqhiMaW-
8eooqsPp8&index=26&t=0s ocN&index=30&t=0s
https://www.youtube.com/
watch?v=UUoBOKq1IxQ&list
4 AES, =PLV8vIYTIdSnYazIVgQkws7
MqhiMaW-
ocN&index=32&t=0s
https://www.geeksforgeeks. http://www.crypto-
5 RC4, https://www.youtube.com/ org/rc4-encryption- it.net/eng/symmetric/rc4.ht
watch?v=p0HM_mnA_HM algorithm/ ml
https://www.youtube.com/ https://www.youtube.com/ https://www.youtube.com/
watch?v=rlJTMUBXhKE&list watch?v=eIoit6XCC1o&list= watch?v=Lz-
6 RSA, =PL9FuOtXibFjV77w2eyil4Xz PLV8vIYTIdSnYazIVgQkws7M wjH9QCdY&list=PLnr_aTgr6
p8eooqsPp8&index=36&t=0 qhiMaW- 7PVnxUftZ6Rv7_K9jmH9MG
s ocN&index=2&t=0s 7k&index=2&t=0s
https://www.youtube.com/
https://www.youtube.com/ watch?v=Mi2May0-
7 Attacks – watch?v=ktb7aouxpRw&list zc8&list=PL9FuOtXibFjV77w
=PL9FuOtXibFjV77w2eyil4Xz 2eyil4Xzp8eooqsPp8&index
p8eooqsPp8&index=6&t=0s =5&t=0s
https://www.youtube.com/ https://www.youtube.com/ https://www.youtube.com/
watch?v=zLNug0LrFiU&list= watch?v=_M2Ea_3DRGA&lis watch?v=aBZrZos-
Diffie-Hellman key PL9FuOtXibFjV77w2eyil4Xzp t=PLV8vIYTIdSnYazIVgQkws7 viQ&list=PLnr_aTgr67PVnxU
8
exchange, 8eooqsPp8&index=38&t=52 MqhiMaW- ftZ6Rv7_K9jmH9MG7k&ind
7s ocN&index=3&t=63s ex=3&t=420s
https://www.youtube.com/
watch?v=GNC3DZCRdA8&lis
ElGamal Public key t=PLV8vIYTIdSnYazIVgQkws7
9
cryptosystems, MqhiMaW-
ocN&index=39&t=0s
https://www.youtube.com/
watch?v=h7n1QEy5H_4&list
10 Secure Hash, =PLV8vIYTIdSnYazIVgQkws7
MqhiMaW-
ocN&index=34&t=0s

11 Birthday attacks, https://www.youtube.com/


watch?v=eoOZPI4YArg
https://www.youtube.com/
watch?v=G_qtQgRmiWk&lis
12 MD5, t=PLV8vIYTIdSnYazIVgQkws7
MqhiMaW-
ocN&index=33&t=0s
https://www.youtube.com/
13 Digital signatures, watch?v=4FHJJxLcX6I&list=P
LV8vIYTIdSnYazIVgQkws7Mq
hiMaW-ocN&index=18&t=0s
https://www.youtube.com/
watch?v=X1TUCeRVv5k&list
Authentication applications
14 =PLV8vIYTIdSnYazIVgQkws7
– Kerberos, MqhiMaW-
ocN&index=4&t=0s

15 X.509, https://www.youtube.com/
watch?v=JAgaWJivKwg

16 PKI – https://www.youtube.com/
watch?v=zHl7NJ1ABd0

17 Electronic Mail security – https://www.youtube.com/


watch?v=iWtsp4WC7A4
https://www.youtube.com/
watch?v=f9qWokekdsA&list
18 PGP, =PLV8vIYTIdSnYazIVgQkws7
MqhiMaW-
ocN&index=35&t=0s

19 S/MIME – https://www.youtube.com/
watch?v=VS7WQUp0kUk

20 IP security – https://www.youtube.com/
watch?v=xwtZBLxbjaU

21 Web Security – https://www.youtube.com/


watch?v=Q4LUWE-tciw
https://www.youtube.com/
watch?v=RVeU__iLzao&list=
22 SSL, PLV8vIYTIdSnYazIVgQkws7M
qhiMaW-
ocN&index=37&t=0s
https://www.youtube.com/
watch?v=FmflaVEZRPo&list=
23 TLS and SET PLV8vIYTIdSnYazIVgQkws7M
qhiMaW-
ocN&index=38&t=0s

24 Malicious software, https://www.youtube.com/


watch?v=6FWqHi3hM2A
https://www.youtube.com/
watch?v=Wx8sMDXccG8&lis
25 viruses and related threats, t=PLV8vIYTIdSnYazIVgQkws7
MqhiMaW-
ocN&index=23&t=0s
https://www.youtube.com/ https://www.youtube.com/ https://www.youtube.com/
watch?v=Xi- watch?v=QOcVe0pT2uw&lis watch?v=dQZCVRYDbzE&list
26 Firewalls, oisdGr_g&list=PL9FuOtXibFj t=PLV8vIYTIdSnYazIVgQkws7 =PLV8vIYTIdSnYazIVgQkws7
V77w2eyil4Xzp8eooqsPp8&i MqhiMaW- MqhiMaW-
ndex=51&t=0s ocN&index=20&t=0s ocN&index=21&t=0s

https://www.youtube.com/
27 Security Standards. watch?v=quROFZoVVEY&list
=PL9FuOtXibFjV77w2eyil4Xz
p8eooqsPp8&index=7&t=0s
https://www.youtube.com/
1
playlist?list=PL9FuOtXibFjV7
7w2eyil4Xzp8eooqsPp8

Go Thru these Video playlist https://www.youtube.com/


2
according to your syllabus playlist?list=PLV8vIYTIdSnYa
zIVgQkws7MqhiMaW-ocN

https://www.youtube.com/
3
playlist?list=PLCZJSEiJwWZ7j
gMB330Y41YlzIyjM5Qnt

https://www.tutorialspoint.
1
com/cryptography
For notes use https://www.geeksforgeeks.
2 org/computer-network-
tutorials/#nsc

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy