Cryptography APK

Cryptography  Icon
0/5
0 Ratings
Developer
Engineering Wale Baba
Current Version
1.8
Date Published
File Size
4.5 MB
Package ID
engg.hub.cryptographyy
Price
$ 0.00
Downloads
221+
Category
Android Apps
Genre
Books & Reference

APK Version History

Version
1.8 (8)
Architecture
universal
Release Date
April 13, 2023
Requirement
Android 8.0+
Version
1.6 (6)
Architecture
universal
Release Date
April 13, 2023
Requirement
Android 4.1+
Version
1.5 (5)
Architecture
universal
Release Date
April 13, 2023
Requirement
Android 4.1+
Version
1.4 (4)
Architecture
universal
Release Date
April 13, 2023
Requirement
Android 4.0.3+
Version
1.2 (2)
Architecture
universal
Release Date
April 13, 2023
Requirement
Android 4.0.3+
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot
  • Cryptography Screenshot

About Radio FM 90s

Cryptography:

The App is designed for quick learning, revisions, references at the time of exams and interviews.

This useful App lists 150 topics with detailed notes, diagrams, equations, formulas & course material, the topics are listed in 5 chapters. The app is must have for all the engineering science students & professionals.

It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures

This app cover most of related topics and Detailed explanation with all the basics topics.

Some of the topics Covered in the app are:

1) Basics of Cryptography
2) Conventional cryptography
3) Key management and conventional encryption
4) Keys
5) Pretty Good Privacy
6) Digital signatures
7) Digital certificates
8) The OSI Security Architecture
9) Network Security
10) Types of attacks
11) Denial of service attack
12) Smurf Attack
13) Distributed Denial of Service Attacks
14) Security Mechanism
15) A Model for Network Security
16) Symmetric Ciphers
17) Classical SubstitutionTechniques
18) Classical Transposition Techniques
19) Rotor Machines
20) Steganography
21) Block Cipher Principles
22) The Data Encryption Standard
23) Differential Cryptanalysis Attack
24) Cipher and Reverse Cipher
25) Security of DES
26) The Strength of DES
27) Differential and Linear Cryptanalysis
28) Block Cipher Design Principles
29) Finite Fields
30) The Euclidean Algorithm
31) Finite Fields of The Form GF(p)
32) Polynomial Arithmetic
33) Finite Fields Of the Form GF(2n)
34) The AES Cipher
35) Substitute Bytes Transformation
36) Evaluation Criteria For AES
37) ShiftRows Transformation
38) AddRoundKey Transformation
39) AES Key Expansion Algorithm
40) Equivalent Inverse Cipher
41) Multiple Encryption and Triple DES
42) Triple DES with Two Keys
43) Block Cipher Modes of Operation
44) Cipher Feedback Mode
45) Output Feedback Mode
46) Counter Mode
47) Stream Ciphers
48) The RC4 Algorithm
49) Random Number Generation
50) Pseudorandom Number Generators
51) Linear Congruential Generators
52) Cryptographically Generated Random Numbers
53) Blum BlumShub Generator
54) True Random Number Generators
55) Key Hierarchy
56) Key Distribution Centre
57) Transparent Key Control Scheme
58) Controlling Key Usage
59) Confidentiality Using Symmetric Encryption
60) Link versus End-to-End Encryption
61) Key Distribution
62) Traffic Confidentiality
63) Prime Numbers
64) Fermat\\\'s and Euler\\\'s Theorems
65) Testing for Primality
66) The Chinese Remainder Theorem
67) Discrete Logarithms
68) Principles of Public-Key Cryptosystems
69) RSA Algorithm
70) Optimal Asymmetric Encryption Padding
71) Key Management
72) Distribution of Secret Keys Using Public-Key Cryptography
73) Diffie-Hellman Key Exchange
74) Example of Deffie Hellman algorithm
75) Key Exchange Protocols
76) Man in the Middle Attack
77) Elliptic Curve Arithmetic

All topics are not listed because of character limitations.

Features :
* Chapter wise complete Topics
* Rich UI Layout
* Comfortable Read Mode
* Important Exam Topics
* Very simple User Interface
* Cover Most Of Topics
* One click get related All Book
* Mobile Optimized Content
* Mobile Optimized Images

This app will useful for quick reference. The revision of all concepts can be finished within Several hour using this app.

Instead of giving us a lower rating, please mail us your queries, issues and give us valuable Rating And Suggestion So we can consider it for Future Updates. We will be happy to solve them for you.

What's New in this version