Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Cryptography
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=74079]


Cryptography is the backbone of the security world. It has been around for a long time now, but with time, it has evolved to a great extent. It's introduction into the world of information security has completely revolutionised the perception and importance of security today. Ensuring privacy is not easy considering the malwares present today and various virus script writers pose a strong challenge to those working towards ensuring security. It's application in basic e-mail exchanges or classified information protection has now made it a very interesting field. So, a breakthrough in this field will not only make us more secure, but it will also help reduce crime and make this world a better place which is our sole aim in the long run.

I am a 3rd year Computer Science Engineering student with a keen interest in Cryptography. I have studied subjects like Computer Communication and Networking, Basic Electronics, Basic Electrical Technology etc in my college curriculum because of which I feel I have more than a decent knowledge on electronic devices concepts. I have been working on networking tools such as Wireshark, Ettercap, Network Simulator, Cisco Packet Tracer etc. My interest in networking and security is the reason I keep experimenting on these softwares. Trying to establish a connection, monitoring the packets, simulating the connection and even ARP poisoning are some of the basic tasks I have implemented and learned about just by playing around with these softwares. I have experience with the Linux environment as I am a full time user of the Ubuntu OS. I have done Shell Scripting and I have a basic knowledge of scripting languages like Python and Ruby. Executing commands directly from the terminal always seemed like a more appealing idea to me, and this is why I switched to Linux from Windows in the first place. I am also fluent in object oriented programming in C++ and event driven programming in Java. One of my favourite subjects in my curriculum was Design and Analysis of Algorithms where we studied about various problem statements solved using algorithms with best possible complexity. Knapsack problem and the Traveling salesman problem are my favourite topics in the algorithm field. I have also completed projects using Java and Android programming.
Apart from this, I also have experience with hardwares. I have worked on microprocessors using the assembly language MASM. I have a detailed knowledge of the theory involved in microprocessors. I showed great interest in labs when we worked on actual hardware because playing with circuits and LED lights seemed to be a very intriguing concept to me.

I also happen to have a research background because of my reading habits. I have a published paper in a journal on the topic “Security in NFC” which again shows my interest in the Information security and RFID field. While doing my research work for this paper, I ended up reading various papers on RFID and cryptographic algorithms. From the beginning of my computer science course, I've been inclined towards networking and security which is why I chose Cryptography and Network Security as one of my electives. This is one of the reasons I feel comfortable about this topic and confident enough that I can actually contribute to your research work. I am currently working on two more projects that are Privacy Preserving Data Minig using Gaussian rule and Polymorphic virus and their propagation methods which again involve security.

I enjoy reading about the latest developments in the computer science world. Reading journals and watching TED videos is something that I can do for hours. In fact, I realised my interest in networking field when I saw a TEDx video on Internet of Things by Dr. John Barrett. To be more precise, when he mentioned the total cloud size available to us was 4000 exabytes which is basically equivalent to the data stored in stack of books from Earth to Pluto and from Pluto back to Earth 80 times, I felt the need to keep reading more and more about this topic. Of all the topics, reading about IoT and Cyber security is one of my favourite hobbies.





I plan to pursue my interest in Computer Networking and Security, Cryptographic algorithms and their complexity by going for a Master's programme after I am done with my undergraduate course. I hope to get into a good University with a good programme which will hone my skill set and increase my subject knowledge.

I came across your details through various searches on the internet and finally on the website of TU Wien i.e. http://www.informatik.tuwien.ac.at/resea...omputation where I started looking for security based research groups and found your contact details. A research internship under your guidance will help me explore this topic and hopefully do good work. I feel that with the right resources provided by your lab and with the right guidance from other researchers and seniors in the lab, I will be able to establish the ideal foundation for my future role as a researcher and make actual and significant progress on this topic.