Interesting Pages
2015-03-28
2-2015 My own corner on the web
Now, I have my own corner, on the web. The new URL for my website is ::
http://drpartha.org.in/index.htm
You can navigate down to all my pages starting from the above page.
Bookmark this page, and let all your friends know about this new site.
If you own or administer a website, please add a link to the above page from your site.
Thanks,
partha
2015-01-26
1-2015 When did it all start ?
On Christmas Day (25 Dec.) I posed myself the question >> "When was Jesus born ?" . More out of curiosity and perplexion as a maths teacher. The question was repeated and published on the Internet, for all the world to answer ::
http://partha-the-prof.blogspot.in/2012/01/32012-when-was-jesus-christ-born.html
http://partha-the-prof.blogspot.in/2012/01/82012-when-was-jc-born-sequel.html
Now, almost three years later, I get a clue from someone who knows more than me on these matters ::
http://aristean.org/birthmay23.htm
Then, why did someone start the confusion with 25 Dec. ?
There is also confusion on the :
date of crucifixion of JC
The whole question is much more fundamental, and of serious tenor when we ask "When exactly did CE start ?" Are we following a calendar which is of questionable origin ?
I am still confused.
partha
2014-10-19
3-2014 It takes a leader to recognise a leader
It takes a leader to recognise a leader
TeX Users Group (TUG) endorses the free ebook LLL - Let's Learn LaTeX. TUG is the ultimate authority in matters related to TeX and LaTeX. TUG has listed LLL amongst the top tutorial resources in LaTeX. TUG has also published an announcement regarding LLL, in its flagship journal TUGBOAT.
What more are you waiting for ?
Start now, take a look at :: http://www.freewebs.com/profpartha/teachlatex.htm
TeX Users Group (TUG) endorses the free ebook LLL - Let's Learn LaTeX. TUG is the ultimate authority in matters related to TeX and LaTeX. TUG has listed LLL amongst the top tutorial resources in LaTeX. TUG has also published an announcement regarding LLL, in its flagship journal TUGBOAT.
What more are you waiting for ?
Start now, take a look at :: http://www.freewebs.com/profpartha/teachlatex.htm
2014-09-12
2-2014 Finding a new home for the Taj Mahal
The LaTeX masterpiece I made, can now be accessed from ::
http://drpartha.org.in/profpartga/teachlatex.htm
Take a look at the Synopsis first.
partha
Take a look at the Synopsis first.
partha
2014-05-11
1 / 2014 It takes time to create a masterpiece
I have just now uploaded my LaTeX magnum opus "Let's Learn LaTeX" to https://sites.google.com/site/drpartha/Home/LLL.zip. It took more than three years of patient study and experimentation, to create all the contents. It took more than a month to find out the ideal way to publish the masterpiece. I yet do not know how many centuries it will need for people to take notice. Maybe it will be archeologists who will discover this masterpiece buried under the pile of debris called the w-w-web. Maybe I wont be alive then, to answer your queries. So, hurry up and start the learning.
2013-08-28
64 / 2013 Course Chronicle (crypto - v4)
Crypto - v4 Course Chronicle
Course website : profpartha.webs.com/cryptov4.htm
Course Instructor : Prof. S. Parthasarathy (drpartha@gmail.com)
Each session = 90 min. approx
Course website : profpartha.webs.com/cryptov4.htm
Course Instructor : Prof. S. Parthasarathy (drpartha@gmail.com)
Each session = 90 min. approx
Session # | Date | Events |
---|---|---|
34,35 | 2014-01-12 | Final exam. |
32,33 | 2014-01-08 | Closure. Debriefing. Exam announcement and instructions. Course feedback and speakout. Salute the giants. Videos: 1. Alan Turing 2. Claude Shannon |
30, 31 | 2014-01-03 | Misc. concepts and tools: Leet, one-way encryption, steganography, Hamming, Chaffing and winnowing, secure wipe/shred, ethical hacking, practice what you preach. |
28, 29 | 2014-01-02 | SSL at work. Detailed overview of SSL. Downloading and importing CA root certificate, and CRL. CRL vs OCSP. Videos : 1. The web is down 2. DDOS 3. How SSL works |
26, 27 | 2014-01-01 | Network security tools. PKI. TCP/IP. IPV4 vs IPV6. IPSEC. Other tools. |
24, 25 | 2013-12-27 | Principles of Authentication, Identity authentication, content authentication, zero-knowledge authentication, challenge-response authentication, biometric authentication, passwords. Strong passwords. Demo of password meters. Video: What are smart cards ? |
22, 23 | 2013-12-26 | Security enhanced Linux, Multi-level security, BIOS password, Bootloader password, Login password, secure coding tools, Discretionary access control, Mandatory access control, Physical verification of GPG fingerprints of students keys. |
20, 21 | 2013-12-25 | Number theory -- DL problem. Overview of RSA algorithm. Mid course review. The Indian angle. |
18, 19 | 2013-12-20 | Fundamental concepts in number theory, Peano's axioms, What are Numbers ?, Divisibility, quotient, remainder, modulo arithmetic, properties of modulo arithmetic, Fermat's little theorem, Euler's generalisation, modulo inverse, Prime numbers, co-primes, Euler's totient function, GCD, Euclidean algorithm, extended Euclidean algorithm. |
16, 17 | 2013-12-16 | Cryptographic standards. Block ciphers, Feistel structures. DES, 3DES, AES. ECB, CBC modes, S box, P box. Overview of Blowfish, IDEA. Video -- Key strength and brute force attacks. Exercise 5, 5a, 5b |
13, 14, 15 | 2013-12-13 | GPG Command examples. Export keys. Import keys. Secure key distribution. Exercises : 4a, 4b, 4c -- importing keys securely |
12, 13 | 2013-12-09 | GPG introduction. Command examples. Demo: Creating GPG key pairs. |
9, 10, 11 | 2013-12-06 | Pig pen cipher, Block ciphers, Feistel networks. Hash digests, MAC and HMAC, principles of hash digests, properties of hash digests, md family vs. sha family, sha3, digital signatures, properties and usage, demos of md5sum and shasum, "How to build a fortress" Video: Diffie Helman key exchange -- paints analogy Exercise #3: Subscribe Schneier's cryptogram newsletter. |
7, 8 | 2013-12-02 | Symm. key crypto contd., ROT13, XOR, Vigenere cipher, trap-door functions, factoring problem, discrete logarithm problem. Video: Locked box analogy Demo: Doing it with zip. Doing it with vi Exercise #2: Symmetric encryption with zip. |
5, 6 | 2013-11-28 | Elements of cryptography, terminology, encryption vs. decryption, Why Alice and Bob should go on a holiday, Caesar's cipher, symmetric keys, key exchange problem, concepts of asymmetric key cryptography, public key vs. private key. Videos: Ronald Rivest, Bruce Schneier. |
3,4 | 2013-11-27 | e-security: risks, threats, remedies. Simple examples. Exercises #1a, #1b, #1c. Handout DVD distributed to the class. |
1, 2 | 2013-11-21 | Start crypto-v4 course. Take off lecture. Security questionnaire. |
0 | 2013-11-10 to 2013-11-20 | Political disturbances. KU closed due to strikes. |
2013-08-18
63/2013 You need help ?
You need more info. ? You need help ?
If you want help, and you expect people to help you, ask. But, ask wisely and with some sense of decency and responsibility.
Learn how you can prove that you deserve being helped.
partha
62/2013 A sequel to the sequel
This is a sequel to my post 61/2013. My final and definive response to the cynical, xenophobic and puerile comments made by some of you, is here.
2013-07-21
61/2013 Cryptography has Indian roots
Conents removed for editing and updates
Labels:
cipher,
crypto,
cryptography,
Hindu,
India,
kama sutra,
Rama,
Sita
2013-05-23
60/2013 Cryptography for e-security (crypto-v3) May 2013- July 2013
Cryptography Course (crypto-v3)- website ::
http://www.freewebs.com/profpartha/cryptoKUv3.htm
Each ession = 90 minutes
http://www.freewebs.com/profpartha/cryptoKUv3.htm
Each ession = 90 minutes
Class # | Date | Highlights |
---|---|---|
19, 20 | 2013-06-21 | Closure and Debriefing session. Misc. security techniques :: steganography, hamming, chaffing, winnowing, shred. Exam details announced. Videos on : Alan Turing, Claude Shannon. |
18 | 2013-06-20 | Network security tools : SSH SSL Explained |
16, 17 | 2013-06-11 | Authentication. Testing password strength. Network security Tools. IPV6, IPSEC, PEM. S/MIME, SET, SSL/TLS. |
15a | 2013-06-12 | Linux overview. Twin boot concept. Installing Linux/Ubuntu demo. Distributed copies of BOSS Linux. |
15 | 2013-06-09 | Authentication principles. Two factor authentication. Biometric authentication. Passwords. |
13, 14 | 2013-06-07 | Elementary number theory. Modular arithmetic. Fermat's little theorem, Euler's theorem. Factoring problem. Inverse Logarithm problem. Prime numbers. GCD. Euclidean algorithm and extended Euclidean algorithm.
Overview of RSA algorithm |
12 | 2013-06-06 | Overview of some cryptographic standards. Feistel networks. DES, 3DES, IDEA. S box. P box. |
11 | 2013-06-02 | Hash digests. Essential properties. md family vs sha family. Merkle Damgard construction. Role of digests in digital signatures. sha3 competition and result. How to build a fortress with hash digest and digital signature. |
09, 10 | 2013-05-31 | PGP/GPG. Encrytion, decryption, signing, verfification with GPG. Keys and key management using Command Line. KGPG interface, Thunderbird interface. |
08 | 2103-05-30 | Security issues in operating systems. Linux security features. Introduction to PGP/GPG |
07 | 2013-05-26 | Security issues in operating systems. Linux security features. SE Linux. |
05, 06 | 2013-05-24 | Asymm. Key Cryptography. Intro: AKC, PKI, PKC, X509. Viginere Cipher, Feistel cipher, Pigpen cipher. Stream cipher vs block cipher. Encryption, signing. Videos: DH key exchange, suitcase analogy. |
04 | 2013-05-23 | Symm. Key Cryptography. Demo using zip, vi. Videos -- Ron Rivest, Bruce Schneier. Distributed copies of course DVD |
03 | 2013-05-19 | CE students (56) join the class. Cryptography fundamental principles. |
02 | 2013-05-16 | E-security overview. Threats, remedies. |
01 | 2013-05-15 | CS students = 19. Take-off lecture. Course overview. |
Subscribe to:
Posts (Atom)