BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani
Pilani Campus
INSTRUCTION DIVISION
First Semester 2015-2016
COURSE HANDOUT (PART II)
In addition to Part-I (general handout for all courses appended to this time table) this portion gives further
details p

CRYPTOGRAPHY
BITS F463
Lecture 8
Block Cipher Operation
BITS Pilani, Hyderabad Campus
Overcoming vulnerabilities of DES
Given the potential vulnerability of DES to a brute-force
attack, there has been considerable interest in finding an
alternative
One

CRYPTOGRAPHY
BITS F463
Lecture 9
Pseudo random numbers
BITS Pilani, Hyderabad Campus
Introduction to random
numbers
Random numbers play an important role in the use of encryption for various
network security applications
Traditionally, the concern in th

CRYPTOGRAPHY
BITS F463
Lecture 5
Modern Block Ciphers
and Data Encryption Standard
modern block ciphers
one of the most widely used types of
cryptographic algorithms
provide secrecy /authentication services
focus on DES (Data Encryption Standard)
Illustra

CRYPTOGRAPHY
BITS F463
Lecture 10
Asymmetric Ciphers:
Introduction to Number Theory
BITS Pilani, Hyderabad Campus
Number Theory
(As applied to public key cryptographic algorithms)
Prime Numbers
Fermats and Eulers Theorems
Fermats Theorem
Eulers Totien

CRYPTOGRAPHY
BITS F463
Lecture 14
Hash and MAC Algorithms
BITS Pilani, Hyderabad Campus
Hash and MAC Algorithms
Hash Functions
condense arbitrary size message to fixed size
by processing message in blocks
through some compression function
either cust

CRYPTOGRAPHY
BITS F463
Lecture 15
Digital Signatures &
Authentication Protocols
BITS Pilani, Hyderabad Campus
Digital Signatures
The most important development from the work on publickey cryptography is the digital signature. Message
authentication prote

CRYPTOGRAPHY
BITS F463
Lecture 13
Message Authentication and Hash
Functions
BITS Pilani, Hyderabad Campus
Need for message
authentication
Up untill now, have been concerned with protecting message
content (ie secrecy) by encrypting the message
We need t

CRYPTOGRAPHY
BITS F463
Lecture 12
Other cryptographic systems
BITS Pilani, Hyderabad Campus
Concepts in other crypto
systems
Diffie-Hellman Key Exchange
Elgamal Cryptographic System
Elliptic Curve Arithmetic
Elliptic Curve Cryptography
Pseudorandom N

CRYPTOGRAPHY
BITS F463
Lecture 4
Transposition Ciphers
All the techniques examined so far involve the
substitution of a ciphertext symbol for a plaintext symbol
A very different kind of mapping is achieved by
performing some sort of permutation on the p

CRYPTOGRAPHY
BITS F463
Lecture 7
Evolution of AES
The Advanced Encryption Standard (AES) was published by NIST
(National Institute of Standards and Technology) in 2001. AES is a
symmetric block cipher that is intended to replace DES as the approved
stand

CRYPTOGRAPHY
BITS F463
Lecture 3
Language Redundancy and
Cryptanalysis
human languages are redundant
eg "th lrd s m shphrd shll nt wnt"
letters are not equally commonly used
in English E is by far the most common letter
followed by T,R,N,I,O,A,S
other le

Fuzzy Logic Applications in
control systems
HOW IS FL DIFFERENT FROM CONVENTIONAL
CONTROL METHODS?
FL incorporates a simple, rule-based IF X AND Y THEN Z approach to a
solving control problem rather than attempting to model a system
mathematically.
The FL

Neural Networks and Fuzzy Logic
BITS F312
The State Differential Equation
The state of a system is described by the set of first-order differential
equations written in terms of the state variables (x1, x2, ., xn)
.
x1 a11 x1 a12 x2 . a1n xn b11 u1 . b1m

Neural Networks and Fuzzy Logic
BITS F312
Introduction
System An interconnection of elements and devices for a desired purpose.
Control System An interconnection of components forming a system configuration
that will provide a desired response.
Process Th

Fuzzy Classification &
Clustering
There is structure in nature and phenomena we wish to
understand :
natural sphericity of rain drops and bubbles,natural repetition
of the mounds of sand dunes
For fields dealing with diagnosis we often seek to find str

TRANSMITTERS AND RECEIVERS OF AM & FM
B. Sainath
EEE Dept., BITS PILANI
Sep., 2016
B. Sainath (BITS, PILANI)
AM, FM Transmitters & Receivers
Sep., 2016
1 / 22
Outline
1
AM TRANSMITTERS
2
AM RECEIVERS
3
FM TRANSMITTERS & RECEIVERS
4
TEXT BOOK AND REFERENCE

INTRODUCTION
TO
ARTIFICIAL INTELLIGENCE
Artificial Intelligence
Its Roots and Scope
AI is generally associated with computer
science.
But it has more important links with fields
such as mathematics, psychology,
cognition, biology and philosophy.
AI differ

FUZZY LOGIC
10/10/16
1
10/10/16
2
Is there a need for fuzzy
logic? is an issue which is
associated with a long history
of spirited discussions and
debate.
There are many
misconceptions about fuzzy
logic.
Its
not that Logic is FuzzyIts the
Fuzzy
logic
is n

Signals & Systems
EEE/ INSTR F243
BITS Pilani
Pilani Campus
ANU GUPTA
System response
to an everlasting exponential est
If h(t) is the system's unit impulse response, then system
response y(t) to an everlasting exponential est is given by
H(s) is a consta

CRYPTOGRAPHY
BITS F463
Lecture 2
Cryptographic Techniques
Cryptology prior to the modern age was almost
synonymous with encryption, the conversion of
information from a readable state to apparent nonsense
Until modern times cryptography referred almost

CRYPTOGRAPHY
BITS F463
Lecture 1
Learning Objectives
Cryptography is an indispensable tool for
protecting
information
in
computer
systems
Learning to reason about the security of
cryptographic constructions and to apply
this knowledge to real-world applic