Subscribe:

Pages

Showing posts with label CS-IT-seminars-C. Show all posts
Showing posts with label CS-IT-seminars-C. Show all posts

Monday, September 20, 2010

Cryptography is the art of devising codes and ciphers

Cryptography is the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key.
Cryptology took on many forms in the centuries between the fall of Rome and the dawn of the Industrial Age. By the late 19th century, with the advent of the telegraph and wireless radio, cryptology took its permanent place as an important component of commercial, military and diplomatic communications. Rudimentary mechanical and electromechanical encoding inventions developed at the turn of the 20th century and through World War I laid the foundation for stronger and more efficient cipher devices.
With the dawn of the computer age, the possibilities for encryption methods and devices expanded exponentially. Machines with blazing fast computing power gave cryptographers the ability for the first time to design complicated encryption techniques.
The next great evolution in cryptology came with the introduction of microprocessor-powered computers. The rapid deployment of increasingly powerful desktops quickened the pace of cryptographic development, since even a moderately skilled computer user could break many of the algorithms in use.
Cryptology is more deeply rooted in every part of our communication and computing world than when it was first employed by ancient peoples. We use it to protect everything from e-mail to e-commerce transactions to personal diaries. As our dependency upon technology increases, so too will our dependency upon cryptography. After all, we all have things we want to keep secret.

Sunday, July 18, 2010

Cryptography

Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels
Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient
The basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file


More details
See full size image

Sunday, September 27, 2009

Cryptography

Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels

Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient

The
basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file

CLUSTERING TECHNOLOGY

The world of commerce relies on highly available information systems to run and manage core business operations such as data warehousing, online transaction processing, and decision support system solutions. Likewise, the worlds of science and engineering also rely on high-performance computing to provide solutions and solve problems,. No matter how fast or available today’s computers are, tomorrow’s applications will invariably demand more. A stage has been reached where stand-alone computers can no longer provide the required levels of availability and reliability. Today’s challenge involves not just providing high availability and optimal performance, but doing so flexibly and inexpensively. Clustering Technology should prove to be a possible solution to address a broad range of system availability and performance requirements.

A Cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. Generally speaking, clusters offer a way to utilize computer resources more productively in comparison to when the same number of machines in working standalone – the total result is greater than the sum of the separate parts. Clustering Technology aims at providing continuous high availability of resources despite processor and communication failures.

CELLULAR TECHNOLOGY

As we head into the 21st century, wireless communications are becoming a household name. Currently there are over 60 million cell phone subscribers in the world. It is not the cost of the cell phone device that counts but the cost of using it .as a result, the cellular phone infrastructure is being optimized to allow calls to be placed as inexpensively and reliably as possible. Today more than ever, cellular companies are looking for ways to bring down the cal cost to achieve even higher market penetration, especially in metropolitan areas.

Cell phones are available with an incredible array of functions. Depending on the cell phone model, you can store contact information, make task or to-do lists, keep track of appointments and set remainders, use the built calculator for simple math, send or receive email, get information (news, entertainment, stock quotes) from the internet, play simple games, and integrate other devices such as personal digital assistants (PDA), mp3 players, and GPS receivers.

We are going to explore the advent of analog cellular, security flaws and fixes, as well as the dawning of a new age with the proliferation of digital cellular technology.

Saturday, August 1, 2009

COOPERATIVE LINUX

Cooperative Linux, abbrieviated as coLinux, is software that lets Microsoft Windows cooperate with the Linux kernel to run both in parallel on the same machine. Cooperative Linux utilizes the concept of a Cooperative Virtual Machine (CVM). In contrast to traditional VMs, the CVM shares resources that already exist in the host OS. In traditional (host) VMs, resources are virtualized for every (guest) OS. The CVM gives both OSs complete control of the host machine while the traditional VM sets every guest OS in an unprivileged state to access the real machine. The term \"cooperative\" is used to describe two entities working in parallel. In effect Cooperative Linux turns the two different operating system kernels into two big coroutines. Each kernel has its own complete CPU context and address space, and each kernel decides when to give control back to its partner. However, while both kernels theoretically have full access to the real hardware, modern PC hardware is not designed to be controlled by two different operating systems at the same time. Therefore the host kernel is left in control of the real hardware and the guest kernel contains special drivers that communicate with the host and provide various important devices to the guest OS

CYBORG

Cyborg is a cybernetic organism. Cybernetics is a study of communication and control of machines, organism or a mixture of both. Cyborg is a mixture of organism and technology. An organism with any type of enhancement can be called cyborg. It is half living and half machine. The process of becoming a cyborg is called cyborgation. There are different type of cyborg such as cyborg with artificial hearts, cyborgs with retinal implants, cyborgs with brain sensors cyborgs with bionic arms etc. Also animal cyborgs such as cyborg eel, robo roach etc. Cyborg find there application mainly in military, medicine etc. Most of the soldiers in US military are undergoing cyborgation. Cyborgation is used for treatment of Parkinson̢۪s disease, for people with vision problem etc.

Content Srambling System

Content Scramble System (CSS) is an encryption system used on some DVDs. It uses a weak, proprietary 40-bit encryption stream cipher algorithm. The system was introduced circa 1996.. The CSS key sets are licensed to manufacturers who incorporate them into products such as DVD drives, DVD players and DVD movie releases. Most DVD players are equipped with a CSS Decryption module. CSS key is a collective term for authentication key, disc key, player key, title key, second disk key set, and/or encrypted key.