Financial data Cryptography FTEC 251
NEW COURSE CRYPTOGRAPHY
-
-
Chapter 1
- Security Service 22:38
- Security Trinity
- security Example 04:09
- Rising Edge in security 01:52
- Case Study 04:40
-
Chapter 2
- Cryptography 17:29
- Traditional cypher 09:23
- substitution ,One Time PAD 15:36
- Extra EXAMPLE One Time Pad 03:40
- Transposition Cipher 08:23
- EXTRA SLIDE CHAPTER 2 03:38
-
Quiz1
- Revision_Quiz1 _CH1,2,3
- Revision CHAPTER3
- EXAM_ CH 1, 2, 3
- EXAM NEW CH1,2,3
- EXAM1. 05:44
- EXAM2. 03:52
- QUIZ1 2022 09:07
- QUIZ1 2023 NEW 05:33
- Quiz 1 2023 third term 06:05
- QUIZ1 2023 NEW EXTRA 03:11
- QUIZ1 EXAM 2024 15:27
- QUIZ1 2024 EXTRA 04:04
- QUIZ1 2025 06:04
- QUIZ1 2025 EXTRA 07:29
- QUIZ1 2025 Extra2 02:20
-
Chapter 3
- XOR Cipher 09:52
- Rotation Cipher 09:45
- DES 20:28
- Round In DES ,KEY Generation 29:59
-
Chapter 4
- Introduction to AES 17:48
- Example AES 21:49
- MIX COLUMN 33:03
- Example Expantion key 08:14
- Example SLIDE CH3 00:00
- The role of symmetric cryptography in Financial 14:24
-
Lecture 5#MODULE arthimetic
- Introduction Modular Math 14:12
- Addition,Subtraction,Multiplication 12:22
- Eculidean Algorithm 29:32
-
Assignment#
- Assignment 1 part 1 12:27
- Assignment 1 part 2 10:37
- Assignment 2 new # 12:28
- Assignment 3 06:21
-
Tutorial #
- Tutorial 1 part1 14:21
- Tutorial 1 part2 10:03
- Tutorial 2 DES part 1 18:00
- Tutorial 2 DES part 2 24:05
- Tutorial 3 AES* 27:34
- Tutorial 4 part 1 RSA 22:33
- Tutorial 4 part 2 RSA 12:16
- Tutorial 5 GPA 10:49
- Tutorial 6 GPA 10:12
- ASSIGNMENT2 GPA
- tutorial 5 (kelopatra) 13:27
- Tutorial 6 Kleopatra 06:49
- Assignment2 kleopatra 08:34
-
Chapter 6 #RSA, El gamal
- Extra example how calculate mod for large number
- Public Key Cryptography 12:26
- RSA 28:50
- Diffie Hellman 11:11
- El-Gamal Cipher 15:55
-
MID1 (EXAM 4,5,6)
- MID1_REVISION1_ch4,5 19:46
- Multiple_Choice_CH1-CH6 06:21
- EXAM CH3 12:46
- MID BLACKBOARD CH 4,5 04:43
- Mid blackboard ch3,4,5 08:30
- MID 2023 3RD TERM 14:16
- MID 2023 NEW 17:10
- MID1 2024 16:13
- MID1 2025 09:11
-
Chapter7 #HASH
- Security services 10:27
- Message Integrity,Hash Criteria 17:29
- Hash Algorithm SHA-1 18:23
- Digital Signature 18:10
- MID2(EXAM 7)
-
Chapter 8 ATTACKS ON HASH
- Authentication 25:53
- Birthday Attack ,Rainbow 24:38
- SALT 12:46
-
Chapter 9 #Key distribution
- Key distribution 23:34
- Hyprid Key Distrbution 16:49
-
chapter 10#Encryption technique for financial data
- Financial technology 21:10
- Type of encryption technique 16:57
-
Final Revision
- EXAM CH8 02:22
- MID2 EXAM 04:17
- Mid2 2024 new * 08:06
- Final Exam1 08:38
-
Chapter 1
-
NEW COURSE CRYPTOGRAPHY -
My name is Sara I 'm electronic and communication engineer.
Sara Qualifications: Masters in Networks and Communications.
Sara Experiences:
1- professor at the National Institute of Communications for training computer network courses like CCNA ,CCNP , computer programs.
2- Sara experiences 10 years for teaching Princess Noura University subjects as :
* communications and network fundamentals It222
*computer network fundamentals it221
* Digital Logical design cs105
* Information Security it311
*advanced computer network net431
*Satellite Communication it425
*Wireless Network it331
*Network security net412d
* Network King saud university
*Digital logic design IMAMU University
-
Student feedback
5Course Rating
350 SAR -150SAR
Original Price 500 SAR - Hurry up!
Lectures
90 Videos
Duration
17:06:48
Material
64 Files
Assignments
Yes, Completely
Labs
Yes, Completely
Project
Yes, Completely
Certificate
Not Applicable
Reviews (0)
Real reviews from real students.
No reviews yet.