0% found this document useful (0 votes)
20 views5 pages

SEMINAR LIST - Student

The document outlines a seminar organized by the Department of Computer Science and Engineering at Cambridge Institute of Technology, focusing on Cryptography and Network Security. It lists various topics presented by students along with their names and USNs, covering a range of cryptographic concepts including symmetric and asymmetric encryption, attacks on encrypted messages, and public key infrastructure. The seminar is scheduled for the VII semester, sections A and B, with an announcement date of December 4, 2024.

Uploaded by

meghanakitkat93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views5 pages

SEMINAR LIST - Student

The document outlines a seminar organized by the Department of Computer Science and Engineering at Cambridge Institute of Technology, focusing on Cryptography and Network Security. It lists various topics presented by students along with their names and USNs, covering a range of cryptographic concepts including symmetric and asymmetric encryption, attacks on encrypted messages, and public key infrastructure. The seminar is scheduled for the VII semester, sections A and B, with an announcement date of December 4, 2024.

Uploaded by

meghanakitkat93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CAMBRIDGE INSTITUTE OFTECHNOLOGY-NORTH CAMPUS

Off International Airport Road, Kundana, Bengaluru – 562110

SEMINAR

Department of Computer Science and Engineering

Programme: CSE Semester &Section: VII – Section


A&B
Course Code& Title : 21CS733- CRYPTOGRAPHY AND Date of Announcement: 4th Dec
NETWORK 2024
SECURITY
Faculty Name : Anand Kumar Date of Completion :

SL.N NAME USN Title


O
1. 1AJ21CS00 Symmetric Cipher Model
ADHITHAN V 1
2. 1AJ21CS00 Model of Symmetric Cryptosystem
ABHISHEK H B 2
3. 1AJ21CS00 Cryptanalysis and Brute-Force Attack
ABHISHEK S ILLUR 3
4. 1AJ21CS00 Types of Attacks on Encrypted Messages
ADITYA KULKARNI 4
5. 1AJ21CS00 Substitution Techniques
AKASH M N 5
6. 1AJ21CS00 Caesar Cipher
ARPITHA R 7
7. 1AJ21CS00 Monoalphabetic Ciphers
ARUN KUMAR P A 8
8. ASIMA SADIYA 1AJ21CS00 Playfair Cipher
KOUSER 9
9. 1AJ21CS01 Hill Cipher
B S RISHITHA 1
10. 1AJ21CS01 Polyalphabetic Ciphers
B SHREYA 2
11. 1AJ21CS01 One-Time Pad
BANDI NAINISHA 3
12. 1AJ21CS01 Stream Ciphers and Block Ciphers
BHARATH G V 4
13. 1AJ21CS01 The Feistel Cipher
BHARGAVI M V 5
14. 1AJ21CS01 Feistel Encryption and Decryption (16 rounds)
BRUNDA MC 7
15. 1AJ21CS01 Data Encryption Standard
CHANDAN M S 8
16. 1AJ21CS01 The Avalanche Effect
CHANDAN. P 9
17. 1AJ21CS02 The Strength of DES
CHARAN S 0
18. 1AJ21CS02 Block Cipher Design Principles
CHETHAN A D 1
19. 1AJ21CS02 Public-Key Cryptosystems
CHINMAYI A B 2
20. 1AJ21CS02 Requirements for Public-Key Cryptography
DARSHAN C BADIGER 3
21. DARSHAN KUMAR 1AJ21CS02 The RSA Algorithm
BHANDARI 4
22. 1AJ21CS02 Computational Aspects of RSA
DAYANA STHUTHI 5
23. 1AJ21CS02 The Security of RSA
DAYYALA HYNDAVI 6
24. 1AJ21CS02 The Diffie-Hellman Key Exchange
DUDALA TEJA 7
25. 1AJ21CS02 Man-in-the-Middle Attack(Diffie-Hellman)
GAGANGOWDA K R 9
26. 1AJ21CS03 Elgamal Cryptographic System
GANAVI S 0
27. 1AJ21CS03 Key Distribution Scenario (Symmetric Encryption)
HARSHA C 1
28. HARSHAVARDHAN 1AJ21CS03 Automatic Key Distribution for Connection-Oriented Protocol
NEERATI 2
29. 1AJ21CS03 Decentralized Key Distribution
HEMA C
3
30. 1AJ21CS03 Control Vector Encryption and Decryption
HEMANTH T 4
31. 1AJ21CS03 Simple Use of Public-Key Encryption to Establish a Session Key
HEMANTH V 5
32. 1AJ21CS03 Secret Key Distribution with Confidentiality and
HIMALAYA PANDEY 6 Authentication
33. 1AJ21CS03 Man-in-the-Middle Attack(Public Key Cryptosystem)
JAYANTH C R 7
34. 1AJ21CS03 Distribution Of Public Keys
K KUSHAL KUMAR 8
35. 1AJ21CS03 Public-Key Authority
KALYAN B N 9
36. 1AJ21CS04 Public-Key Certificates
KARTHIK D M 0
37. KAVALI ARUNKUMAR 1AJ21CS04 X.509 Certificates
YADAV 1
38. KAVALI CHANDU 1AJ21CS04 X.509 Hierarchy
YADAV 2
39. 1AJ21CS04 Obtaining a User’s Certificate
KAVYASHREE H M 3
40. 1AJ21CS04 Revocation of Certificates
KEERTHISAN M
4
41. 1AJ21CS04 X.509 Version 3
KIFAYTULLAH 5
42. KOPPURAVRI SAI 1AJ21CS04 PKIX Architectural Model
TANUSH 6
43. 1AJ21CS04 Replay attacks
KUBITH S 7
44. 1AJ21CS04 Remote user-Authentication Principles
LAVANYA R SHETTY 9
45. 1AJ21CS05 One-Way Authentication
LIKITH M 0
46. 1AJ21CS05 Remote User-Authentication Using
LIKITHA N 1 Symmetric Encryption
47. 1AJ21CS05 Kerberos 4
LOMADA NANDINI 2
48. LOMADA RUPESH 1AJ21CS05 Kerberos Exchanges
REDDY 3
49. 1AJ21CS05 Kerberos Version 5
M HARSHAVARDHAN 4
50. MADDIPATLA 1AJ21CS05 Remote User Authentication Using
KISHORE 5 Asymmetric Encryption
51. 1AJ21CS05 Pretty Good Privacy
MADHANKUMAR V 6
52. 1AJ21CS11 PGP Cryptographic Functions
CHANDANA B G 4
53. PRAVEEN KUMAR 1AJ21CS11 Transmission and Reception of PGP Messages
PE 5
54. 1AJ21CS11 Secure/Multipurpose Internet Mail Extension (S/MIME)
SANGEETH S 6
55. CHETHAN KUMAR 1AJ22CS40 Multipurpose Internet Mail Extensions
V 1
56. DIVAKARA YADAV 1AJ22CS40 IPsec
D 3
57. 1AJ22CS40 IPsec Architecture
ROHIT MANGALE 7
58. 1AJ22CS40 IPsec Services
SHARATH MANE 9
59. 1AJ22CS41 Transport and Tunnel Modes
SHIVANNA N 0
60. 1AJ22CS41 IP Security Policy
SIVABALAN S 2
61. 1AJ22CS41 Encapsulating Security Payload
VINAY KUMAR H C 4
62. 1AJ22CS41 Internet Key Exchange
VITHESH 5
63. 1AJ21CS05 Symmetric Cipher Model
MADHURA B G 7
64. 1AJ21CS05 Model of Symmetric Cryptosystem
MADHUSUDHAN K R 8
65. 1AJ21CS05 Cryptanalysis and Brute-Force Attack
MANUSHREE H 9
66. 1AJ21CS06 Types of Attacks on Encrypted Messages
MEGHANA C D 0
67. MIDHUNYA 1AJ21CS06 Substitution Techniques
VELUMANI 1
68. MOHAMMAD IDREES 1AJ21CS06 Caesar Cipher
WANI 2
69. 1AJ21CS06 Monoalphabetic Ciphers
MOHAMMED ZUBAIR 3
70. 1AJ21CS06 Playfair Cipher
MOHD KASHIF 5
71. MORRAPPAGARI 1AJ21CS06 Hill Cipher
PRAVALLIKA 6
72. 1AJ21CS06 Polyalphabetic Ciphers
NAMANA 7
73. 1AJ21CS06 One-Time Pad
NAVYA SHREE V G 8
74. 1AJ21CS06 Stream Ciphers and Block Ciphers
NAVYASREE H M 9
75. 1AJ21CS07 The Feistel Cipher
NEHA R 0
76. 1AJ21CS07 Feistel Encryption and Decryption (16 rounds)
NISARGA R 1
77. 1AJ21CS07 Data Encryption Standard
NISCHITHA L 2
78. NISHA N 1AJ21CS07 The Avalanche Effect
3
79. 1AJ21CS07 The Strength of DES
NITHIN JAIN V P 4
80. 1AJ21CS07 Block Cipher Design Principles
P ANKITHA 5
81. 1AJ21CS07 Public-Key Cryptosystems
P G DALE 6
82. 1AJ21CS07 Requirements for Public-Key Cryptography
PRAJWAL N J 7
83. PRANATHI SHETTY A 1AJ21CS07 The RSA Algorithm
K 8
84. 1AJ21CS07 Computational Aspects of RSA
PRATISH RAJ SINGH 9
85. 1AJ21CS08 The Security of RSA
PREKSHA KALGUDI 0
86. PREKSHA RAJARAM 1AJ21CS08 The Diffie-Hellman Key Exchange
NAIK 1
87. PUTLURU Man-in-the-Middle Attack(Diffie-Hellman)
MADHAVANARASIM 1AJ21CS08
HA 2
88. 1AJ21CS08 Elgamal Cryptographic System
RAKSHITH K M 3
89. 1AJ21CS08 Key Distribution Scenario (Symmetric Encryption)
S CHARAN 4
90. S N MOHAMMAD 1AJ21CS08 Automatic Key Distribution for Connection-Oriented Protocol
SIDDIQ BASHA 5
91. 1AJ21CS08 Decentralized Key Distribution
S N PRADEEP 6
92. 1AJ21CS08 Control Vector Encryption and Decryption
SACHIN M 7
93. 1AJ21CS08 Simple Use of Public-Key Encryption to Establish a Session Key
SAI KIRAN S 8
94. 1AJ21CS08 Secret Key Distribution with Confidentiality and
SAMPADA S 9 Authentication
95. 1AJ21CS09 Man-in-the-Middle Attack(Public Key Cryptosystem)
SHAIK SHAMEER 0
96. 1AJ21CS09 Distribution Of Public Keys
SHAMANTH S J 1
97. 1AJ21CS09 Public-Key Authority
SHARVARI P SHETTY 2
98. 1AJ21CS09 Public-Key Certificates
SHASHANK N 3
99. 1AJ21CS09 X.509 Certificates
SHIVAPRASAD B R 4
100. 1AJ21CS09 X.509 Hierarchy
SHRAVANI G 5
101. Obtaining a User’s Certificate
1AJ21CS09
SNEHA D U 6
102. 1AJ21CS09 Revocation of Certificates
SOUJANYA M 7
103. 1AJ21CS09 X.509 Version 3
SRIVATSA S 9
104. 1AJ21CS10 PKIX Architectural Model
STALIN 0
105. 1AJ21CS10 Replay attacks
SUPRITHA H 2
106. 1AJ21CS10 Remote user-Authentication Principles
SWATI G 3
107. 1AJ21CS10 One-Way Authentication
SYED MOHAMMAD 4
108. THANUSHREE M 1AJ21CS10 Remote User-Authentication Using
GALIGOUDAR 5 Symmetric Encryption
109. 1AJ21CS10 Kerberos 4
VADDE SHANKAR 6
110. 1AJ21CS10 Kerberos Exchanges
VAISHNAVI R 7
111. 1AJ21CS10 Kerberos Version 5
VIDYA D 8
112. 1AJ21CS10 Remote User Authentication Using
VINAY DESAI 9 Asymmetric Encryption
113. 1AJ21CS11 Pretty Good Privacy
VIVEK SURYA VAMSHI 0
114. VUNDELA VENKATA 1AJ21CS11 PGP Cryptographic Functions
CHANDRAHAS REDDY 1
115. YARAVA Transmission and Reception of PGP Messages
AKHILESHWAR 1AJ21CS11
REDDY 2
116. YERRASANI Secure/Multipurpose Internet Mail Extension (S/MIME)
BHARATHKUMAR 1AJ21CS11
REDDY 3
117. 1AJ21CS01 Multipurpose Internet Mail Extensions
AYESHA TAHOORA 0
118. 1AJ21CS01 IPsec
Bingi SANTHOSH 6
119. 1AJ22CS40 IPsec Architecture
ARUN KUMAR M G 0
120. CHILLA MOHITH 1AJ22CS40 IPsec Services
KUMAR REDDY 2
121. 1AJ22CS40 Transport and Tunnel Modes
MANISH KUMAR 4
122. 1AJ22CS40 IP Security Policy
MANJUNATHBG 5
123. PADMAVATI 1AJ22CS40 Encapsulating Security Payload
BHASKAR MUKRI 6
124. 1AJ22CS40 Symmetric Cipher Model
S N SALMA 8
125. 1AJ22CS41 Public Key Infrastructure
SINCHANA M 1
126. 1AJ22CS41 Requirements of the public key cryptosystem
SWATHI 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy