Subscribe:

Pages

Showing posts with label CS AND IT SEMINAR TOPICS. Show all posts
Showing posts with label CS AND IT SEMINAR TOPICS. Show all posts

Monday, September 20, 2010

Cryptography is the art of devising codes and ciphers

Cryptography is the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key.
Cryptology took on many forms in the centuries between the fall of Rome and the dawn of the Industrial Age. By the late 19th century, with the advent of the telegraph and wireless radio, cryptology took its permanent place as an important component of commercial, military and diplomatic communications. Rudimentary mechanical and electromechanical encoding inventions developed at the turn of the 20th century and through World War I laid the foundation for stronger and more efficient cipher devices.
With the dawn of the computer age, the possibilities for encryption methods and devices expanded exponentially. Machines with blazing fast computing power gave cryptographers the ability for the first time to design complicated encryption techniques.
The next great evolution in cryptology came with the introduction of microprocessor-powered computers. The rapid deployment of increasingly powerful desktops quickened the pace of cryptographic development, since even a moderately skilled computer user could break many of the algorithms in use.
Cryptology is more deeply rooted in every part of our communication and computing world than when it was first employed by ancient peoples. We use it to protect everything from e-mail to e-commerce transactions to personal diaries. As our dependency upon technology increases, so too will our dependency upon cryptography. After all, we all have things we want to keep secret.

Sunday, July 18, 2010

Cryptography

Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels
Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient
The basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file


More details
See full size image

Monday, June 28, 2010

CS & IT SEMINAR

ELECTRONICS SEMINAR TOPICS

Sunday, September 27, 2009

E-paper

E-paper is a revolutionary material that can be used to make next generation electronic displays. It is portable reusable storage and display medium that look like paper but can be repeatedly written one thousands of times. These displays make the beginning of a new area for battery power information applications such as cell phones, pagers, watches and hand-held computers etc.

Two companies are carrying our pioneering works in the field of development of electronic ink and both have developed ingenious methods to produce electronic ink. One is E-ink, a company based at Cambridge, in U.S.A. The other company is Xerox doing research work at the Xerox’s palo Atto Research Centre. Both technologies being developed commercially for electronically configurable paper like displays rely on microscopic beads that change colour in response to the charges on nearby electrodes.

Like traditional paper, E-paper must be lightweight, flexible, glare free and low cost. Research found that in just few years this technology could replace paper in many situations and leading us ink a truly paperless world.

DIGITALWATERMARKING

The growth of high speed computer networks has explored means of new business, scientific, entertainment, and social opportunities. Digital media offer several distinct advantages over analog media, such as high quality, easy editing, high fidelity copying. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Various software products have been recently introduced in attempt to address these growing concerns. It is done by hiding data within digital audio, images and video files. One way such data hiding is copyright label or digital watermark that completely characterizes the person who applies it and, therefore, marks it as being his intellectual property. Digital Watermarking is the process that embeds data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. Watermarking is either visible or invisible. Although visible and invisible are visual terms watermarking is not limited to images, it can also be used to protect other types of multimedia object.

Cryptography

Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels

Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient

The
basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file

CLUSTERING TECHNOLOGY

The world of commerce relies on highly available information systems to run and manage core business operations such as data warehousing, online transaction processing, and decision support system solutions. Likewise, the worlds of science and engineering also rely on high-performance computing to provide solutions and solve problems,. No matter how fast or available today’s computers are, tomorrow’s applications will invariably demand more. A stage has been reached where stand-alone computers can no longer provide the required levels of availability and reliability. Today’s challenge involves not just providing high availability and optimal performance, but doing so flexibly and inexpensively. Clustering Technology should prove to be a possible solution to address a broad range of system availability and performance requirements.

A Cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. Generally speaking, clusters offer a way to utilize computer resources more productively in comparison to when the same number of machines in working standalone – the total result is greater than the sum of the separate parts. Clustering Technology aims at providing continuous high availability of resources despite processor and communication failures.