Personal tools
You are here: Home Tutorials WORLDCOMP'12 Tutorial: Dr. Asoke Nath and Ms. Joyshree Nath
Important Date
July 16-19, 2012
22 joint conferences

« September 2015 »
Su Mo Tu We Th Fr Sa
Current Event
Click Here

Past Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


WORLDCOMP'12 Tutorial: Dr. Asoke Nath and Ms. Joyshree Nath

Last modified 2012-06-17 15:32

Basics of Cryptography and Network Security
Dr. Asoke Nath 1 & Ms. Joyshree Nath 2

1 St. Xavier's College (Atonomous), West Bengal, India
2 Calcutta University, Kolkata, India

Date: July 17, 2012
Time: 6:00pm
Location: Silver Room


    The main objective of the tutorial is to discuss and show various implementations of basic cryptography methods. We will discuss some very elementary methods of cryptography such as (i) Caeser Cipher method, (ii) Modified Caeser Cipher Method, (iii) Hill Cipher Method, (iv) Diffie hellman key exchange method, (v) Playfair method, (vi) Data Encryption Standard (DES) method, (vii) Advanced Encryption Standard (AES) method, (viii) Meheboob, Saima and Asoke (MSA) algorithm,(ix) DJSA method, (x) NJJSAA method, (xi) TTJSA method, (xii) DJSSA method, (xiii) DJMNA method, and (xiv) UES method. In addition, some public key algorithms will be covered, including: (i) Rivest Shamir and Adleman (RSA) method, (ii) Elliptic curve algorithm; and others (time permitting). We will also show some live demonstrations of recent cryptographic methods. The present tutorial will not only help the beginners but also can potentially help the experts in this field.

Intended Audience

    The present Tutorial would benefit the following types of users:

    • Computer scientists and practitioners whose expertise include one or more fields of computer science but who are not familiar with encryption algorithms. This tutorial is mainly designed to benefit this group.
    • Experts in coding theory and cryptology will also benefit from this tutorial (because there will be some new / novel materials covered).
    • Computer users, operators, and technicians whose background does not include theoretical knowledge of computation. They will learn how to apply the methods that will be discussed in this tutorial.

Biography of Instructors

    Dr. Asoke Nath is Assistant Professor in Computer Science in St. Xavier’s College (Autonomous), Kolkata,India. Dr. Nath is presently working in the field of Cryptography, Steganography and Image processing. Recently Dr. Nath and his research group developed a set of new symmetric key algorithms called MSA, DJSA, DJSSA, NJJSAA,TTJSA, DJMNA, UES, and others. The research group has also developed various methods (they are unique) to hide any encrypted messages inside any kind of host file such as .EXE, .DOC, .PDF. Currently, the group is engaged in developing various encryption methods with potential to be the amalgamation of symmetric key and asymmetric key algorithms resulting in a more enhanced security. Dr. Nath has delivered presentations and tutorials at a number of national and international meetings and conferences, including: Woldcomp 2010 and 2011 at Las Vegas(USA).

    Ms. Joyshree Nath persuing M.Tech(IT) in C.U. She is doing research in the areas of security, in particular, in Steganography and Cryptography. She has developed a new cryptography algorithm called DJSA which is the modified version of MSA. She has also designed and developed a new set of methods for embedding encrypted secret messages inside any host file such as .DOC, .EXE, .PDF, and others. In the recent past, she has participated and delivered papers and tutorials at WORLDCOMP 2011 (Las Vegas, USA).

All tracks of WORLDCOMP have received high citations
Click Here for details

Click Here for details

WORLDCOMP'12 Exhibition
Click Here for details

2012 Co-Sponsors
Bioinformatics & Computational Biology Program
George Mason University, USA

Biomedical Cybernetics Laboratory
HST of Harvard University & MIT, USA

Minnesota Supercomputing Institute
University of Minnesota, USA

Center for Cyber Defense, NCAT

Argonne's Leadership Computing Facility of Argonne National Laboratory
Illinois, USA

The Center for Advanced Studies in Identity Sciences
(CASIS: NC A&T;, Carnegie Mellon, Clemson, UNC Wilmington

Knowledge Management & Intelligent System Center (KMIS)
University of Siegen, Germany

Intelligent Cyberspace Engineering Lab., ICEL
Texas A&M; University, Texas, USA
UMIT, Institute of Bioinformatics and Translational Research

Hawkeye Radiology Informatics
Department of Radiology, College of Medicine, University of Iowa, USA

The International Council on Medical and Care Compunetics
US Chapter of World Academy of Science

Supercomputer Software Department (SSD)
Institute of Computational Mathematics & Mathematical Geophysics, Russian Academy of Sciences

International Society of Intelligent Biological Medicine

Medical Image HPC & Informatics Lab (MiHi Lab)
University of Iowa, USA

High Performance Computing for Nanotechnology (HPCNano)

Manx Telecom

Computer Science Research, Education, and Applications Press;

World Academy of Biomedical Sciences and Technologies

Super Micro Computer, Inc.,
San Jose, California, USA

Intel Corporation

Altera Corporation

Hodges Health

Leading Knowledge

Science Publication


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)