Personal tools
  •  
You are here: Home Tutorials WORLDCOMP'15 Tutorial: Dr. Asoke Nath
Call For Participation
General Attendees
Click here for details


Call for Papers
Submission of
LATE BREAKING PAPERS

Click here for details


Important Dates
July 27-30, 2015
The WORLDCOMP'15
20 joint conferences


Featured Workshops
Doctoral Colloquium
&
Demos Sessions

Click here for details


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
 

WORLDCOMP'15 Tutorial: Dr. Asoke Nath

Last modified 2015-07-12 11:11


Introduction to Cryptography and Network Security
Dr. Asoke Nath
Associate Professor, Department of Computer Science
St. Xavier's College (Autonomous), Kolkata, India

Date & Time: July 27, 2015 (05:40pm - estimated duration: about 2+ hours)
Location: Silver Room


DESCRIPTION

    Due to tremendous growth in Internet technologies now the security of data has become a significant challenge in all spheres of our lives. There is no guarantee that the data will not be intercepted by some hacker during communication (between one client machine and another client machine or a server machine). E-mail helps us a lot to send message quickly from one machine to another but the mode of such communication is not at all secure or safe. A hacker may tamper the mail before it reaches to the real destination. The confidential message or data should not be sent in unencrypted form as it may be intercepted by some hacker. The encryption should be hard enough so that the hacker can not apply any brute force method to retrieve the original data. Any kind of transaction processes in internet should be done in a secure manner. While doing e-banking or e-business one should be very careful about input data and the output data. There are many more areas where the data should not be tampered during any type of transaction such as on-line train or air-line booking, on-line examination etc. Cryptography is a subject which primarily deals with how one can modify a readable text or document/object to unreadable text or document/ object. Cryptography is a two-fold process: (a) encryption algorithm by which one can modify the readable text to some encrypted form that would make it unreadable; and (b) the inverse of encryption, namely, decryption, which extracts the original text or object from encrypted form. The encryption or the decryption methods are generally of two types: (i) Symmetric Key Cryptography where one key is used for encryption as well as decryption processes and (ii) Public key cryptography where we use one key called public key for encryption purpose and another key called private key which is used for decryption purpose. The encryption key is distributed to all senders and the decryption key is distributed to the receiver only. In this presentation the authors will focus on different symmetric key algorithms including some recent trends in symmetric key encryption methods. The authors will also discuss the public key cryptography including RSA algorithm.


OBJECTIVES

    The objective of the presentation is to explore and to introduce various implementations of efficient cryptography methods. The authors will discuss some simple and then more advanced symmetric key and asymmetric key cryptography methods, namely (i) Caeser cipher method, (ii) Modified caeser cipher method, (iii)Hill cipher method, (iv) Diffiehellman key exchange method, (v) Playfair method, (vi) Meheboob, Saima and Asoke(MSA) algorithm and some recent methods of symmetric key algorithm. Various public key algorithms will also be discussed; such as the well known Rivest Shamir and Adleman (RSA) method. This presentation will be informative for both, the beginners and experts in the field.

AGENDA

    • Definition of Cryptography
    • Introduction to Cryptography
    • Some Classical Cryptography Algorithms
        - Modified Caesar Cipher method
        - Transposition Method
        - Vernam Cipher method
        - Book Cipher/Running Key Cipher Method
        - Hill Cipher Method
        - Playfair Method
        - Diffie-Hellman key exchange Method
    • Introduction to Public key cryptography:Rivest Shamir Adleman (RSA) method
    • Symmetric key algorithms developed by Nath et.al
        - Symmetric Key Cryptography using Random Key Generator : Meheboob, Saima and Asoke(MSA) method
        - A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm
        - New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm
        - Symmetric key cryptosystem using combined cryptographic algorithm- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm
        - Ultra Encryption Standard (UES)
        - Modern Encryption Standard(MES)
        - Bit Level Encryption Standard(BLES)
        - Multi Way Feed Back Encryption Standard version-1(MWFES-1)
        - 3-dimensional Multi Way Feedback Encryption Standard(3dMWFES)
    • Introduction to Digital Signature
    • Introduction to Kerberos
    • Conclusion

INTENDED AUDIENCE

    The target audience may be of two categories:

      • Experts in different areas of computer science who wish to have exposure to network security and cryptography.
      • Cryptography practitioners who wish to have exposure to recent advances in cryptography.

BIOGRAPHY OF INSTRUCTOR

    From 1978-1981 Dr. Nath was actively involved in research work in Theoretical study on Crystal field theory. He did his post doctoral work on “Chaos in non linear optics” from 1984-1987 and published several papers in renowned International Journals. During his Ph.D. work and post doctoral work he has done massive computational work in main frame computer. From 1986 he completely switched over to computer science. Attended various National and International seminars, conference on computer science. Presently he is involved in research work on Crytography, Steganography, Image Processing, Green Computing, E-learning. He has published more than 130 papers in International Journals, conference proceedings both national and international. His paper on “Multi way feedback encryption standard(ver-I)” received the best paper award in International Conference ICETTR-2013 held at Nagpur in September 2013, India. He delivered key note addresses, tutorials on Cryptography and Network Security in Worldcomp 2012,2013,2014 held at Las Vegas, USA, ICETTR-2013 held at Nagpur, IEEE WICT 2011 held at Mumbai University, International conference held at Surat in March 2012, IEEE WICT 2013 held at Hanoi Vietnam, IEEE ICMIRA held at SMVDU, Jammu in December 2013, IEEE International Conference on Devices Circuits and Communications (ICDCCom-2014) held in Sept 2014 at BIT Mesra(Ranchi), IEEE conference held at Hotel Pride Kolkata in Nov 2014 . He is the member of board of Editors in more than 30 International Journals in Computer Science and Information Technology. He is also Editor in Chief of International Journal on Network Security. He is a life member of CSI Calcutta chapter, member of MIR Labs(USA).

Conference Proceedings
Get WORLDCOMP'13 & '14 Proceedings
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'13
Click Here

WORLDCOMP'12
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'06, '07, & '08
Click Here


Photo Galleries

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)