Ph.D Guidance In Network Security and Cryptography

One among the many project domains given by S-LOGIX , network security and cryptography is also one. The need for Network Security is gaining its own significance in these recent times. With a Network Security System, all the files, data & personal information are kept safe and protected from unauthorized access from people present on the network and people outside it. Therefore, it is widely used in offices, banks, and many other organizations. The provisions and policies of Network Security help the network administrator to monitor any kind of misuse, modification or unauthorized access of a computer network. Thus, a number of cyber attacks and other harmful activities are prevented.

Cryptography poses a threat to organizations and individuals too. With encryption, an employee of a company can sell proprietary electronic information to a competitor without the need to photocopy and handle physical documents. Electronic information can be bought and sold on “black networks” such as Black-Net with complete secrecy and anonymity — a safe harbor for engaging in both corporate and government espionage. The keys that unlock a corporation’s files may be lost, corrupted, or held hostage for ransom, thus rendering valuable information in accessible. This domain is selected by S-LOGIX for project working in order to meet every other student who are eager to work in many different domains.

  • Research Proposal in Network Security and Cryptography
  • Problem Identification in Network Security and Cryptography
  • Research Methodology
  • Mathematical Model / Formulation
  • Literature Survey in Network Security and Cryptography
  • System Design and Implementation
  • Performance Analysis and Results
  • Writing Services: Journal Papers, Synopsis and Thesis

Courses

  • Ph.D – Computer Science and Engineering, Computer Science, Computer Application, Information Technology, Communication Networks and Wireless Communication
  • M.E/M.Tech/M.S – Computer Science and Engineering, Computer Science, Computer Application,¬†Information Technology, Communication Networks and Wireless Communication.

Related Area

  • Authentication
  • Privacy
  • Access control
  • Confidentiality
  • Using Symmetric Cryptography -DES, Triple-DES, AES
  • Using Public-Key Cryptography- RSA, ECC, ElGamal
  • One-Way Hash Functions- MD4, MD5, SHA, RIPE-MD, MAC
  • Digital Signatures-DSA
  • Undeniable Digital Signatures
  • Proxy Signatures
  • Group Signatures
  • Blind Signatures
  • Authentication and Key Exchange
  • Diffie-Hellman, Encrypted Key Exchange
  • Secret Sharing
  • Zero-Knowledge Proofs of Identity
  • Identity-Based Public-Key Cryptography
  • Digital Cash
  • Secure Elections
  • Key Management
  • Data Encryption Standard (DES)
  • Public-Key Cryptography Standards (PKCS)
  • Universal Electronic Payment System (UEPS)
  • Kerberos
  • Privacy-Enhanced Mail (PEM)
  • Message Security Protocol (MSP)
  • Pretty Good Privacy (PGP)
  • SSL
  • Anonymity
  • Digital Rights Management
  • Watermarking
  • Steganography

Tools and Technologies

  • Netbeans 7.0
  • Eclipse 4.3
  • Tomcat 7.0
  • Glass Fish 4.0
  • My-SQL 5.5
  • SQL-Server /MS-Access
  • Apache Axis2
  • ArgoUML
  • Java Database Connectivity (JDBC)
  • Swings
  • Collections
  • Java Networking
  • Java Server Pages (JSP)
  • Servlets
  • Java Security
  • Java Math
  • Jini
  • Java API for Peer-to-Networks (JXTA)
  • Java API for XML Web Services (JAX-WS)
  • Remote Method Invocation (RMI)
  • Java Naming and Directory Interface (JNDI)
  • Enterprise Java Bean (EJB)
  • Java Message Service (JMS)
  • Java Media Framework (JMF)
  • Java API For XML Processing (JAXP)
  • Java Architecture For XML Binding (JAXB)
  • Apache Jena – Jena Ontology
  • Java Speech
  • Java Advanced Imaging
  • Java FX – Rich Client Platform
  • Java Data Mining