The document outlines a seminar organized by the Department of Computer Science and Engineering at Cambridge Institute of Technology, focusing on Cryptography and Network Security. It lists various topics presented by students along with their names and USNs, covering a range of cryptographic concepts including symmetric and asymmetric encryption, attacks on encrypted messages, and public key infrastructure. The seminar is scheduled for the VII semester, sections A and B, with an announcement date of December 4, 2024.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views5 pages
SEMINAR LIST - Student
The document outlines a seminar organized by the Department of Computer Science and Engineering at Cambridge Institute of Technology, focusing on Cryptography and Network Security. It lists various topics presented by students along with their names and USNs, covering a range of cryptographic concepts including symmetric and asymmetric encryption, attacks on encrypted messages, and public key infrastructure. The seminar is scheduled for the VII semester, sections A and B, with an announcement date of December 4, 2024.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
CAMBRIDGE INSTITUTE OFTECHNOLOGY-NORTH CAMPUS
Off International Airport Road, Kundana, Bengaluru – 562110
SEMINAR
Department of Computer Science and Engineering
Programme: CSE Semester &Section: VII – Section
A&B Course Code& Title : 21CS733- CRYPTOGRAPHY AND Date of Announcement: 4th Dec NETWORK 2024 SECURITY Faculty Name : Anand Kumar Date of Completion :
SL.N NAME USN Title
O 1. 1AJ21CS00 Symmetric Cipher Model ADHITHAN V 1 2. 1AJ21CS00 Model of Symmetric Cryptosystem ABHISHEK H B 2 3. 1AJ21CS00 Cryptanalysis and Brute-Force Attack ABHISHEK S ILLUR 3 4. 1AJ21CS00 Types of Attacks on Encrypted Messages ADITYA KULKARNI 4 5. 1AJ21CS00 Substitution Techniques AKASH M N 5 6. 1AJ21CS00 Caesar Cipher ARPITHA R 7 7. 1AJ21CS00 Monoalphabetic Ciphers ARUN KUMAR P A 8 8. ASIMA SADIYA 1AJ21CS00 Playfair Cipher KOUSER 9 9. 1AJ21CS01 Hill Cipher B S RISHITHA 1 10. 1AJ21CS01 Polyalphabetic Ciphers B SHREYA 2 11. 1AJ21CS01 One-Time Pad BANDI NAINISHA 3 12. 1AJ21CS01 Stream Ciphers and Block Ciphers BHARATH G V 4 13. 1AJ21CS01 The Feistel Cipher BHARGAVI M V 5 14. 1AJ21CS01 Feistel Encryption and Decryption (16 rounds) BRUNDA MC 7 15. 1AJ21CS01 Data Encryption Standard CHANDAN M S 8 16. 1AJ21CS01 The Avalanche Effect CHANDAN. P 9 17. 1AJ21CS02 The Strength of DES CHARAN S 0 18. 1AJ21CS02 Block Cipher Design Principles CHETHAN A D 1 19. 1AJ21CS02 Public-Key Cryptosystems CHINMAYI A B 2 20. 1AJ21CS02 Requirements for Public-Key Cryptography DARSHAN C BADIGER 3 21. DARSHAN KUMAR 1AJ21CS02 The RSA Algorithm BHANDARI 4 22. 1AJ21CS02 Computational Aspects of RSA DAYANA STHUTHI 5 23. 1AJ21CS02 The Security of RSA DAYYALA HYNDAVI 6 24. 1AJ21CS02 The Diffie-Hellman Key Exchange DUDALA TEJA 7 25. 1AJ21CS02 Man-in-the-Middle Attack(Diffie-Hellman) GAGANGOWDA K R 9 26. 1AJ21CS03 Elgamal Cryptographic System GANAVI S 0 27. 1AJ21CS03 Key Distribution Scenario (Symmetric Encryption) HARSHA C 1 28. HARSHAVARDHAN 1AJ21CS03 Automatic Key Distribution for Connection-Oriented Protocol NEERATI 2 29. 1AJ21CS03 Decentralized Key Distribution HEMA C 3 30. 1AJ21CS03 Control Vector Encryption and Decryption HEMANTH T 4 31. 1AJ21CS03 Simple Use of Public-Key Encryption to Establish a Session Key HEMANTH V 5 32. 1AJ21CS03 Secret Key Distribution with Confidentiality and HIMALAYA PANDEY 6 Authentication 33. 1AJ21CS03 Man-in-the-Middle Attack(Public Key Cryptosystem) JAYANTH C R 7 34. 1AJ21CS03 Distribution Of Public Keys K KUSHAL KUMAR 8 35. 1AJ21CS03 Public-Key Authority KALYAN B N 9 36. 1AJ21CS04 Public-Key Certificates KARTHIK D M 0 37. KAVALI ARUNKUMAR 1AJ21CS04 X.509 Certificates YADAV 1 38. KAVALI CHANDU 1AJ21CS04 X.509 Hierarchy YADAV 2 39. 1AJ21CS04 Obtaining a User’s Certificate KAVYASHREE H M 3 40. 1AJ21CS04 Revocation of Certificates KEERTHISAN M 4 41. 1AJ21CS04 X.509 Version 3 KIFAYTULLAH 5 42. KOPPURAVRI SAI 1AJ21CS04 PKIX Architectural Model TANUSH 6 43. 1AJ21CS04 Replay attacks KUBITH S 7 44. 1AJ21CS04 Remote user-Authentication Principles LAVANYA R SHETTY 9 45. 1AJ21CS05 One-Way Authentication LIKITH M 0 46. 1AJ21CS05 Remote User-Authentication Using LIKITHA N 1 Symmetric Encryption 47. 1AJ21CS05 Kerberos 4 LOMADA NANDINI 2 48. LOMADA RUPESH 1AJ21CS05 Kerberos Exchanges REDDY 3 49. 1AJ21CS05 Kerberos Version 5 M HARSHAVARDHAN 4 50. MADDIPATLA 1AJ21CS05 Remote User Authentication Using KISHORE 5 Asymmetric Encryption 51. 1AJ21CS05 Pretty Good Privacy MADHANKUMAR V 6 52. 1AJ21CS11 PGP Cryptographic Functions CHANDANA B G 4 53. PRAVEEN KUMAR 1AJ21CS11 Transmission and Reception of PGP Messages PE 5 54. 1AJ21CS11 Secure/Multipurpose Internet Mail Extension (S/MIME) SANGEETH S 6 55. CHETHAN KUMAR 1AJ22CS40 Multipurpose Internet Mail Extensions V 1 56. DIVAKARA YADAV 1AJ22CS40 IPsec D 3 57. 1AJ22CS40 IPsec Architecture ROHIT MANGALE 7 58. 1AJ22CS40 IPsec Services SHARATH MANE 9 59. 1AJ22CS41 Transport and Tunnel Modes SHIVANNA N 0 60. 1AJ22CS41 IP Security Policy SIVABALAN S 2 61. 1AJ22CS41 Encapsulating Security Payload VINAY KUMAR H C 4 62. 1AJ22CS41 Internet Key Exchange VITHESH 5 63. 1AJ21CS05 Symmetric Cipher Model MADHURA B G 7 64. 1AJ21CS05 Model of Symmetric Cryptosystem MADHUSUDHAN K R 8 65. 1AJ21CS05 Cryptanalysis and Brute-Force Attack MANUSHREE H 9 66. 1AJ21CS06 Types of Attacks on Encrypted Messages MEGHANA C D 0 67. MIDHUNYA 1AJ21CS06 Substitution Techniques VELUMANI 1 68. MOHAMMAD IDREES 1AJ21CS06 Caesar Cipher WANI 2 69. 1AJ21CS06 Monoalphabetic Ciphers MOHAMMED ZUBAIR 3 70. 1AJ21CS06 Playfair Cipher MOHD KASHIF 5 71. MORRAPPAGARI 1AJ21CS06 Hill Cipher PRAVALLIKA 6 72. 1AJ21CS06 Polyalphabetic Ciphers NAMANA 7 73. 1AJ21CS06 One-Time Pad NAVYA SHREE V G 8 74. 1AJ21CS06 Stream Ciphers and Block Ciphers NAVYASREE H M 9 75. 1AJ21CS07 The Feistel Cipher NEHA R 0 76. 1AJ21CS07 Feistel Encryption and Decryption (16 rounds) NISARGA R 1 77. 1AJ21CS07 Data Encryption Standard NISCHITHA L 2 78. NISHA N 1AJ21CS07 The Avalanche Effect 3 79. 1AJ21CS07 The Strength of DES NITHIN JAIN V P 4 80. 1AJ21CS07 Block Cipher Design Principles P ANKITHA 5 81. 1AJ21CS07 Public-Key Cryptosystems P G DALE 6 82. 1AJ21CS07 Requirements for Public-Key Cryptography PRAJWAL N J 7 83. PRANATHI SHETTY A 1AJ21CS07 The RSA Algorithm K 8 84. 1AJ21CS07 Computational Aspects of RSA PRATISH RAJ SINGH 9 85. 1AJ21CS08 The Security of RSA PREKSHA KALGUDI 0 86. PREKSHA RAJARAM 1AJ21CS08 The Diffie-Hellman Key Exchange NAIK 1 87. PUTLURU Man-in-the-Middle Attack(Diffie-Hellman) MADHAVANARASIM 1AJ21CS08 HA 2 88. 1AJ21CS08 Elgamal Cryptographic System RAKSHITH K M 3 89. 1AJ21CS08 Key Distribution Scenario (Symmetric Encryption) S CHARAN 4 90. S N MOHAMMAD 1AJ21CS08 Automatic Key Distribution for Connection-Oriented Protocol SIDDIQ BASHA 5 91. 1AJ21CS08 Decentralized Key Distribution S N PRADEEP 6 92. 1AJ21CS08 Control Vector Encryption and Decryption SACHIN M 7 93. 1AJ21CS08 Simple Use of Public-Key Encryption to Establish a Session Key SAI KIRAN S 8 94. 1AJ21CS08 Secret Key Distribution with Confidentiality and SAMPADA S 9 Authentication 95. 1AJ21CS09 Man-in-the-Middle Attack(Public Key Cryptosystem) SHAIK SHAMEER 0 96. 1AJ21CS09 Distribution Of Public Keys SHAMANTH S J 1 97. 1AJ21CS09 Public-Key Authority SHARVARI P SHETTY 2 98. 1AJ21CS09 Public-Key Certificates SHASHANK N 3 99. 1AJ21CS09 X.509 Certificates SHIVAPRASAD B R 4 100. 1AJ21CS09 X.509 Hierarchy SHRAVANI G 5 101. Obtaining a User’s Certificate 1AJ21CS09 SNEHA D U 6 102. 1AJ21CS09 Revocation of Certificates SOUJANYA M 7 103. 1AJ21CS09 X.509 Version 3 SRIVATSA S 9 104. 1AJ21CS10 PKIX Architectural Model STALIN 0 105. 1AJ21CS10 Replay attacks SUPRITHA H 2 106. 1AJ21CS10 Remote user-Authentication Principles SWATI G 3 107. 1AJ21CS10 One-Way Authentication SYED MOHAMMAD 4 108. THANUSHREE M 1AJ21CS10 Remote User-Authentication Using GALIGOUDAR 5 Symmetric Encryption 109. 1AJ21CS10 Kerberos 4 VADDE SHANKAR 6 110. 1AJ21CS10 Kerberos Exchanges VAISHNAVI R 7 111. 1AJ21CS10 Kerberos Version 5 VIDYA D 8 112. 1AJ21CS10 Remote User Authentication Using VINAY DESAI 9 Asymmetric Encryption 113. 1AJ21CS11 Pretty Good Privacy VIVEK SURYA VAMSHI 0 114. VUNDELA VENKATA 1AJ21CS11 PGP Cryptographic Functions CHANDRAHAS REDDY 1 115. YARAVA Transmission and Reception of PGP Messages AKHILESHWAR 1AJ21CS11 REDDY 2 116. YERRASANI Secure/Multipurpose Internet Mail Extension (S/MIME) BHARATHKUMAR 1AJ21CS11 REDDY 3 117. 1AJ21CS01 Multipurpose Internet Mail Extensions AYESHA TAHOORA 0 118. 1AJ21CS01 IPsec Bingi SANTHOSH 6 119. 1AJ22CS40 IPsec Architecture ARUN KUMAR M G 0 120. CHILLA MOHITH 1AJ22CS40 IPsec Services KUMAR REDDY 2 121. 1AJ22CS40 Transport and Tunnel Modes MANISH KUMAR 4 122. 1AJ22CS40 IP Security Policy MANJUNATHBG 5 123. PADMAVATI 1AJ22CS40 Encapsulating Security Payload BHASKAR MUKRI 6 124. 1AJ22CS40 Symmetric Cipher Model S N SALMA 8 125. 1AJ22CS41 Public Key Infrastructure SINCHANA M 1 126. 1AJ22CS41 Requirements of the public key cryptosystem SWATHI 3