4
SerialNo RegisterationNumber Name RollNumber 1 11308259 Amit Thakur RD1E32A01 2 11308546 Ravi Kumar RD1E32A02 3 11300812 Mohd Amir RD1E32A03 4 11308798 Charanpreet Singh RD1E32A04 5 11309074 Shruti Mahajan RD1E32A05 6 11303654 Bhavna Sharma RD1E32A06 7 11303695 Nitesh Parbhakar RD1E32A07 8 11306042 Manjit Singh RD1E32A08 9 11306408 Anil Kumar Singh RD1E32A09 10 11400286 Tarun Manhas RD1E32A23 11 11400939 Rahul Thakkar RD1E32A27 12 11401690 Samuel Lallawmzuala RD1E32A35 13 11401712 Subhash Pal Singh RD1E32A36 14 11401783 Rohan Kumar RD1E32A41 15 11401788 Sushant Kumar RD1E32A42 16 11401816 Sunita RD1E32A43 17 11401852 Pandav Kishan Rameshbhai RD1E32A44 18 11402039 Manoj Kumar RD1E32A45 19 11402273 Narinder RD1E32A46 20 11402723 Abee Singla RD1E32A48 21 11403850 Mandeep Kaur RD1E32A49 22 11405694 Embok Paia Ramde RD1E32A50 23 11405931 Baljeet Kaur RD1E32A51 24 11405939 Shilpa RD1E32A52 25 11406324 Monika Bhalla RD1E32A53 26 11407709 Gurpreet RD1E32A54 27 11408582 Ravi Tiwari RD1E32A55 28 11409125 Gurinder Kaur RD1E32A58 29 11412331 Vikrant Kumar RD1E32A60 30 11404839 Suthar Dilipkumar Mangarambhai RD1E32A61 31 11102072 Gaurav Pal RD1E32B10 32 11103012 Dheeraj Kumar Pandey RD1E32B11 33 11108212 Parvej Akhtar RD1E32B12 34 11108568 Abhishek RD1E32B13 35 11108985 Shashank Chandra Samaiyar RD1E32B14 36 11109373 Akarsh Tiwari RD1E32B15 37 11110152 Anuj Kumar Sahu RD1E32B16 38 11111934 Rahul Kumar RD1E32B17 39 11112151 Sakesh Kumar RD1E32B18 40 11112261 Ashutosh Kumar RD1E32B19 41 11114176 Gagan Choudhury RD1E32B20 42 11000517 Amritansh Shankar Singh RD1E32B21 43 11400441 Kaniz Zohra Ajmali RD1E32B24 44 11400471 Rimi Biswas RD1E32B25

Term Paper Topics CAP606

Embed Size (px)

DESCRIPTION

networks

Citation preview

Sheet1SerialNoRegisterationNumberNameRollNumberCryptovirology111308259Amit ThakurRD1E32A01Genetic Cryptography211308546Ravi KumarRD1E32A02Block cipher Modes of Operation311300812Mohd AmirRD1E32A03Random Number Generation411308798Charanpreet SinghRD1E32A04Elliptic Curve cryptography511309074Shruti MahajanRD1E32A05KERBEROS611303654Bhavna SharmaRD1E32A06Different types of cryptanalysis711303695Nitesh ParbhakarRD1E32A07Data Compression Using ZIP811306042Manjit SinghRD1E32A08Rotational Cryptanalysis911306408Anil Kumar SinghRD1E32A09Differential cryptanalysis1011400286Tarun Manhas RD1E32A23SSL and TLS1111400939Rahul ThakkarRD1E32A27Elliptic Curve cryptography1211401690Samuel LallawmzualaRD1E32A35quantum cryptography1311401712Subhash Pal SinghRD1E32A36Different types of attack made on AES1411401783Rohan KumarRD1E32A41Different types of attack made on Twofish1511401788Sushant KumarRD1E32A42Different types of attack made on MARS1611401816Sunita RD1E32A43Different types of attack made on Serpent1711401852Pandav Kishan RameshbhaiRD1E32A44Different types of attack made on RC61811402039Manoj KumarRD1E32A45Rational Cryptography1911402273NarinderRD1E32A46ID based cryptography2011402723Abee SinglaRD1E32A48Anti-Phishing Techniques2111403850Mandeep Kaur RD1E32A49SHA-3 competition and Sha-3 finalist2211405694Embok Paia RamdeRD1E32A50biclique cryptanalysis2311405931Baljeet Kaur RD1E32A51boomerang attack2411405939ShilpaRD1E32A52Rainbow table2511406324Monika BhallaRD1E32A53Anonymous internet banking2611407709GurpreetRD1E32A54AEAD block cipher modes of operation2711408582Ravi TiwariRD1E32A55birthday attack2811409125Gurinder Kaur RD1E32A58bit flipping attack2911412331Vikrant KumarRD1E32A60Bit-torrent protocol encryption3011404839Suthar Dilipkumar MangarambhaiRD1E32A61Working of TLS protocol3111102072Gaurav PalRD1E32B10DiffieHellman key exchange3211103012Dheeraj Kumar PandeyRD1E32B11Digital timestamping3311108212Parvej AkhtarRD1E32B12Digital watermarking3411108568Abhishek RD1E32B13Integral cryptanalysis3511108985Shashank Chandra SamaiyarRD1E32B14Internet key exchange3611109373Akarsh TiwariRD1E32B15pairing based cryptography3711110152Anuj Kumar SahuRD1E32B16Robot certificate authority3811111934Rahul KumarRD1E32B17related key attack3911112151Sakesh KumarRD1E32B18replay attack4011112261Ashutosh KumarRD1E32B19Secure remote password protocol4111114176Gagan ChoudhuryRD1E32B20Undeniable signature4211000517Amritansh Shankar SinghRD1E32B21Zero-knowledge password proof 4311400441Kaniz Zohra AjmaliRD1E32B24XML Encryption4411400471Rimi BiswasRD1E32B25Cryptovirology4511400523Harpreet KaurRD1E32B26Genetic Cryptography4611401062Agresh PandeyRD1E32B29Block cipher Modes of Operation4711401163Ravi Bhushan SinghRD1E32B30Random Number Generation4811401232Mayank BhandariRD1E32B31Elliptic Curve cryptography4911401252Aman TyagiRD1E32B32Bit-torrent protocol encryption5011401492Mohd. AmirRD1E32B33Working of TLS protocol5111401498Rohan SunejaRD1E32B34related key attack5211401744Gautam MarwahaRD1E32B37replay attack5311401749Palvi VermaRD1E32B38Secure remote password protocol5411401752Sandeep Ohri RD1E32B39Bitcoin and cryptocurrency5511401755Anurag BatraRD1E32B40quantum cryptography5611402526Manpreet Kaur RD1E32B47Different types of attack made on AES5711408710Maninder Singh RD1E32B56Digital Certificates5811408713Varinderjit Singh DoadRD1E32B57Different types of cryptanalysis5911411977Akash BhartiRD1E32B59side Channel Attack