1234

Information Technology videos-1

1.Substitution Techniques-Hill cipher

2.Monoalphabetic and ceser cipher with example

3.Feistel cipher/ strucutre

4.modes of operations

5.DES (Data Encryption standard) ALGORITHM

No comments:

Post a Comment