Tutorials

  Asoke Nath      
Asoke Nath
St. Xavier’s College
(Autonomous),India
Mohamed Chawki
University of Lyon III,
French
Gauri S. Mittal
University of Guelph,
Canada

-----------------------------------------------------------------------------------------------------------------

 

Asoke Nath

Cryptography and Network Security
Asoke Nath
St. Xavier’s College(Autonomous),India 

 [Abstract] Due to tremendous development in network communications now security of data is a real challenge to all spheres of our life. For sending data from one client machine to another client machine or to a server machine one must always take precaution that the data is not intercepted by some hacker. Due to fast transmission we always prefer e-mail to send question paper. But a hacker can very easily hack the question paper and one can guess what will be the consequence of that. The electronic business, e-banking system are now very common issue. In the bother side the hackers are very active to find the weak points in the data communication and network. Due to open access of data now we have to encrypt the data otherwise the data may be intercepted by anyone and can make any kind of disaster. Suppose one bank user sent a request to the Bank Manager to debit some amount from one account and to credit the same amount to another account. Now it is intercepted by some hacker and he change the message and inform the manager to credit the amount to hacker’s account. This may be further worse in the battle field . Suppose a Major has sent some confidential message to his Captain to attack the enemy from a particular place and now if some hacker intercept the message and send it to the enemy then it may create a massive disaster.. So therefore the message should be always sent in encrypted manner. Cryptography a subject which deals with basically how one can encrypt the plain text or the clear text and also how to decrypt the encrypted message. The encryption methods mainly are of two(2) types: (i) Symmetric Key Cryptography where one key is used for encryption as well as decryption purpose. , (ii) Public key Encryption methods where we use one key called public key for encryption purpose and another key called private key which is used for decryption purpose. The encryption key is distributed to the sender and the decryption key is distributed to the receiver only. In present tutorial we will discussing in brief both types of encryption methods. We will be discussing the following methods:
1. What is Cryptography?
2. History of Cryptography
3. Brief introduction to symmetric key cryptography and public key cryptography
4. Different symmetric key algorithms:
    (i) Caseser Cipher method
    (ii)Modified Caeser Cipher method
    (iii)Rail Fence method
    (iv)Vernam Cipher method and generalized Vernam Cipher method
    (v) Hill Cipher method
    (vi) Playfair method
    (vii)Diffie-Hellman key exchange method
(viii) Data Encryption Standard(DES) method
    (ix)Advanced Encryption Standard(AES) method
5. Some new symmetric key algorithms developed by Nath et.al:
    (i) Meheboob, Saima and Asoke(MSA) method
    (ii)Dripto,Joyshree,Suvodeep and Asoke(DJSA) symmetric key algorithm
    (iii) Dripto,Joyshree,Suvodeep,Saumitra and Asoke(DJSSA) symmetric key algorithm
    (iv)Neeraj, Joel, Joyshree,Sayantan,Amlan and Asoke(NJJSAA) algorithm
    (v)Modified DJSA algorithm.
    (vi)Modified DJSSA algorithm
    (vii)Modified NJJSAA algorithm
6. Public key cryptography:
    (i) Rivest Shamir Adleman (RSA) method
    (ii) Elliptic curve method
7. Introduction to message digest: MD2,MD4,MD5.
8. Some important methods :SHA-1, Kurberos
9. Conclusion

 [Objective:] The main purpose this tutorial is to discuss some efficient cryptography methods. There are quite a number of cryptography methods available. In the present study we will primarily discuss some efficient symmetric key methods and also public key cryptography. Special emphasize will be given on security system in sensor networks and mobile networks. Recently Nath et al developed some efficient symmetric key cryptography algorithm. In the present tutorial we will discuss in detail the method proposed by Nath et al.

 [Intended audience:] The audience may be of 2 categories: (i) The first category audience are expert in different discipline and now they want to learn what is network security and cryptography and (ii) Those who are working in cryptography and wants to know more about it. We will present the matter in such a way that both beginners and experts both will be benefited.

 [Biography]

1. Passed M.Sc. in Physics in 1976 from University of North Bengal.
2. Obtained Ph.D. in Science in 1984 from University of North Bengal.
3. Worked as Full-time Research Scholar in Indian Association For the Cultivation of Science from 1978-1981 and as Part-Time Research Scholar from 1982-1984.
4. Worked as Research Officer in NSF Project(USA) in Indian Association for the Cultivation of Science from 1984-1986
5. Worked as Full-time Lecturer-in-Physics in Dinhata College, Cooch Behar from 1981-1984.
6. Worked as Computer Programmer at Rabindra Bhavan, Viswa Bharati University from 1986-1987.
7. Joined as Assistant Director of St. Xavier’s Computer Centre on 12-th February 1987.
8. The designation Assistant Director has been changed to Executive Director since April 1st 1992.
9. Passed M.C.A. from Sikkim Manipal University in 2009.

Research Experience:

From 1978-1981 he was actively involved in research work in Theoretical work on Crystal field theory. Did post doctoral work on “Chaos in non linear optics” from 1984-1987 and published several papers in renowned International Journals. During his Ph.D. work and post doctoral work he has done massive computational work in main frame computer. From 1986 he completely switch over to computer science. Attended various National and International seminars, conference on computers. Presently he involved in research work on Crytography, Steganography, Image Processing, Ethical hacking. Presented a Paper on Symmetric Key cryptography in World Congress on Computer Science held at Las Vegas in USA in July-2010. Presented 2 papers and one tutorial session at Worldcomp-2011 held at Las Vegas from 18/07/2011 to 21/07/2011.

Currently engaged in various research projects of undergraduate level and also Post graduate in Computer science. An UGC minor research project on “Cryptography” approved in November-2010. Started working on Pervasive computing and Quantum Cryptography.

Teaching Experince:

Approximately taught 3 years B.Sc. Physics in under graduate college. Actively teaching in various topics of Computer Science in various courses at the Computer centre since 1987. He was the founder Head of the Department of Computer Science in 1998 when the dept formed at St. Xavier’s College. He was acting as the head of the department of computer science from 1998 to 2008. He is actively taking classes on various subjects of computer science in under graduate level from 2001. He acted as visiting faculty of A.K.Chaudhury School of IT, Raja Bazar Science College for taking classes in MCA and M.Tech(IT). He is also the part-time MCA counselor of IGNOU . The subjects normally he take classes are computer fundamentals, Operating system : MSDOS, WINDOWS, LINUX , computer languages : C,C++,FORTRAN,.Pascal, NET and C#,JAVA,MATLAB and SIMULINK, Visual Basic., Database S/W : ORACLE 9i, DBA-I and II, Database Tuning, ACCESS. Electronic Spread Sheet: EXCEL, Computer Graphics, Operations Research, Linear Programming problem, Numerical Methods, Discrete Mathematics, Compiler Theory, Finite State Automation, Cryptography, Steganography, Digital Signal Processing, Design of Web Page using HTML,XML and Javascript .

 

Top

---------------------------------------------------------------------------------------------------------------------------------------------

 

Mohamed Chawki

Cybercrimes : Threats from a Networked Environment
Mohamed Chawki
University of Lyon III, France 

 [Abstract] Cybercrime is of major concern to the global community. The introduction, growth and utilization of information and communication technologies (ICTs) have been accompanied by an increase in criminal activity. With respect to cyberspace, the internet is increasingly used as a tool and medium by transnational organized crime. This form of illegal behavior is not exclusive to online fraud, but also covers identity theft, phishing and botnets.

It is estimated that the annual losses from cybercrime are about $67 billion in the US (Thostenson, 2009). New techniques are constantly being implemented and regulations being adopted to combat and eradicate diverse forms of cybercrime, yet ICTs are also providing new means and tools that facilitate online money laundering and cyber fraud. On such a basis, these new forms of organized crime present new challenges to lawmakers, and law enforcement agencies. This necessitates the existence of effective supra-national as well as domestic mechanisms that monitor the utilization of ICTs for criminal activities. Accordingly, this presentation provides a brief overview of the current national and regional efforts pertaining cybercrime and the cybercriminal.

 [Biography]

Mohamed Chawki holds a (Ph.D.) in law from the University of Lyon III in France for a dissertation on French; British and American cybercrime legal systems. He is senior judge at the Council of State; former advisor to the Chairman of Capital Market Authority (CMA) and the Chairman of the Egyptian Financial Supervisory Authority (EFSA). Dr. Chawki is also the Founder Chairman of the International Association of Cybercrime Prevention (AILCC) in Paris. An association of international IT experts and legal scholars specializing in cyber law, privacy and security and the founder and co – director of the African Center for Cyberlaw, in Kampala (ACCP), founded in collaboration with the United Nations (UN).

Dr. Chawki has extensive knowledge of High Tec criminality, cybercrime, cyber terrorism and IT, including countermeasures and prevention. As a part of his research, he carried out an internship at Interpol’s Financial and High Tec Crime Unit. He has also conducted legal analysis for the Organisation of CyberAngels in NYC and advice cybercrime victims on various issues related to countermeasures and prevention. Doctor Chawki is a Fellow of the Royal Society of Arts in the United Kingdom (FRSA), a member of the International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program (ISPAC), a member of the European Society of Criminal Law, and a board member of Computer Crime Research Center (CCRC) in Ukraine. He teaches law at private and public universities in Egypt and holds a number of visiting posts abroad. His research interest covers national security, cybercrime and data protection.

He has delivered over 60 conference papers on cybercrime and information security and organized many national, regional and international conferences on the same topics.

 

Top

---------------------------------------------------------------------------------------------------------------------------------------------

 

Mohamed Chawki

Engineering System Modelling and Simulation for optimal Design
Gauri S. Mittal
Systems Engineering at the School of Engineering, University of Guelph, Guelph, Ontario, Canada, N1G 2W1 

 [Abstract] This tutorial will cover system modeling and simulation for optimal design. Various components of mechanical, electrical, thermal, and hydraulic systems with their mathematical representation will be included. The modeling will be based on basic physical laws such that conservation of mass and energy, Newton’s second law, and Kirchoff’s laws. First and second order engineering systems will be covered, and system parameters will be optimized for required design. Various examples will be provided. System response will be studied for various inputs such as step, impulse, ramp and sinusoidal. Automatic system control examples will be given for PID controls. The simulation will be based on Mat lab. The partial differential equations will be converted to ordinary differential equations using finite differences. Participants will be able to learn many techniques in these areas. This will be suitable for the people working in any industry and in teaching and research.

 [Biography] GAURI S. MITTAL, P.Eng., Professor of Systems Engineering at the School of Engineering, University of Guelph, Guelph, Ontario, Canada. An author of more than 250 refereed journal research papers and 210 other publications, as well as three books, e.g. ”Computerized Controls in Food Industry”. He is a member of many technical societies. He is the recipient of the 1994 John Clark Award presented by the Canadian Society of Bioengineering, the 1994 Membro Benemerito Award given by the Colombian Association of Food Engineers, International Best Researcher award 2005 & 2007 by Japanese Association of Food Machinery Manufacturers, and Fellow (2010) of Canadian Society of Bioengineering. A registered professional engineer, professor Mittal received the B.Sc. (Engg.) (1969) from India, M.Sc. (1976) from the University of Manitoba, Winnipeg, Canada, and the Ph.D. (1979) from the Ohio State University, Columbus, USA. 

Top

---------------------------------------------------------------------------------------------------------------------------------------------