2015-03-28

2-2015 My own corner on the web

Now, I have my own corner, on the web. The new URL for my website is ::
http://drpartha.org.in/index.htm

You can navigate down to all my pages starting from the above page.

Bookmark this page, and let all your friends know about this new site. If you own or administer a website, please add a link to the above page from your site.

Thanks, partha

2015-01-26

1-2015 When did it all start ?

On Christmas Day (25 Dec.) I posed myself the question >> "When was Jesus born ?" . More out of curiosity and perplexion as a maths teacher. The question was repeated and published on the Internet, for all the world to answer ::

http://partha-the-prof.blogspot.in/2012/01/32012-when-was-jesus-christ-born.html

http://partha-the-prof.blogspot.in/2012/01/82012-when-was-jc-born-sequel.html

Now, almost three years later, I get a clue from someone who knows more than me on these matters :: http://aristean.org/birthmay23.htm

Then, why did someone start the confusion with 25 Dec. ?

There is also confusion on the :

date of crucifixion of JC

The whole question is much more fundamental, and of serious tenor when we ask "When exactly did CE start ?" Are we following a calendar which is of questionable origin ?

I am still confused.

partha

2014-10-19

3-2014 It takes a leader to recognise a leader

It takes a leader to recognise a leader

TeX Users Group (TUG) endorses the free ebook LLL - Let's Learn LaTeX. TUG is the ultimate authority in matters related to TeX and LaTeX. TUG has listed LLL amongst the top tutorial resources in LaTeX. TUG has also published an announcement regarding LLL, in its flagship journal TUGBOAT.

What more are you waiting for ?

Start now, take a look at :: http://www.freewebs.com/profpartha/teachlatex.htm

2014-09-12

2014-05-11

1 / 2014 It takes time to create a masterpiece

I have just now uploaded my LaTeX magnum opus "Let's Learn LaTeX" to https://sites.google.com/site/drpartha/Home/LLL.zip. It took more than three years of patient study and experimentation, to create all the contents. It took more than a month to find out the ideal way to publish the masterpiece. I yet do not know how many centuries it will need for people to take notice. Maybe it will be archeologists who will discover this masterpiece buried under the pile of debris called the w-w-web. Maybe I wont be alive then, to answer your queries. So, hurry up and start the learning.

2013-08-28

64 / 2013 Course Chronicle (crypto - v4)

Crypto - v4 Course Chronicle
Course website : profpartha.webs.com/cryptov4.htm
Course Instructor : Prof. S. Parthasarathy (drpartha@gmail.com)
Each session = 90 min. approx
















Session #DateEvents
34,352014-01-12Final exam.
32,332014-01-08Closure. Debriefing. Exam announcement and instructions. Course feedback and speakout. Salute the giants.
Videos: 1. Alan Turing 2. Claude Shannon
30, 312014-01-03Misc. concepts and tools: Leet, one-way encryption, steganography, Hamming, Chaffing and winnowing, secure wipe/shred, ethical hacking, practice what you preach.
28, 292014-01-02SSL at work. Detailed overview of SSL. Downloading and importing CA root certificate, and CRL. CRL vs OCSP.
Videos :
1. The web is down
2. DDOS
3. How SSL works
26, 272014-01-01 Network security tools. PKI. TCP/IP. IPV4 vs IPV6. IPSEC. Other tools.
24, 252013-12-27Principles of Authentication, Identity authentication, content authentication, zero-knowledge authentication, challenge-response authentication, biometric authentication, passwords. Strong passwords. Demo of password meters.

Video: What are smart cards ?
22, 232013-12-26Security enhanced Linux, Multi-level security, BIOS password, Bootloader password, Login password, secure coding tools, Discretionary access control,
 Mandatory access control,

Physical verification of GPG fingerprints of students keys.
20, 212013-12-25Number theory -- DL problem.

Overview of RSA algorithm.

Mid course review. The Indian angle.
18, 192013-12-20Fundamental concepts in number theory, Peano's axioms, What are Numbers ?, Divisibility, quotient, remainder, modulo arithmetic, properties of modulo arithmetic, Fermat's little theorem, Euler's generalisation, modulo inverse, Prime numbers, co-primes, Euler's totient function, GCD, Euclidean algorithm, extended Euclidean algorithm.
16, 172013-12-16Cryptographic standards. Block ciphers, Feistel structures. DES, 3DES, AES. ECB, CBC modes, S box, P box. Overview of Blowfish, IDEA.

Video -- Key strength and brute force attacks. Exercise 5, 5a, 5b
13, 14, 152013-12-13GPG Command examples. Export keys. Import keys. Secure key distribution.

Exercises : 4a, 4b, 4c -- importing keys securely
12, 132013-12-09GPG introduction. Command examples.

Demo: Creating GPG key pairs.
9, 10, 112013-12-06Pig pen cipher, Block ciphers, Feistel networks. Hash digests, MAC and HMAC, principles of hash digests, properties of hash digests, md family vs. sha family, sha3, digital signatures, properties and usage, demos of md5sum and shasum, "How to build a fortress"

Video: Diffie Helman key exchange -- paints analogy

Exercise #3: Subscribe Schneier's cryptogram newsletter.
7, 82013-12-02Symm. key crypto contd., ROT13, XOR, Vigenere cipher, trap-door functions, factoring problem, discrete logarithm problem.

Video: Locked box analogy
Demo: Doing it with zip. Doing it with vi

Exercise #2: Symmetric encryption with zip.
5, 62013-11-28Elements of cryptography, terminology, encryption vs. decryption, Why Alice and Bob should go on a holiday, Caesar's cipher, symmetric keys, key exchange problem, concepts of asymmetric key cryptography, public key vs. private key.

Videos: Ronald Rivest, Bruce Schneier.
3,42013-11-27e-security: risks, threats, remedies. Simple examples.

Exercises #1a, #1b, #1c. Handout DVD distributed to the class.
1, 22013-11-21Start crypto-v4 course. Take off lecture.

Security questionnaire.
02013-11-10 to 2013-11-20 Political disturbances. KU closed due to strikes.

2013-08-18

63/2013 You need help ?

You need more info. ? You need help ?

If you want help, and you expect people to help you, ask. But, ask wisely and with some sense of decency and responsibility.

Learn how you can prove that you deserve being helped.

partha

62/2013 A sequel to the sequel

This is a sequel to my post 61/2013. My final and definive response to the cynical, xenophobic and puerile comments made by some of you, is here.

2013-05-23

60/2013 Cryptography for e-security (crypto-v3) May 2013- July 2013

Cryptography Course (crypto-v3)- website ::

http://www.freewebs.com/profpartha/cryptoKUv3.htm

Each ession = 90 minutes





















Class #DateHighlights
19, 202013-06-21Closure and Debriefing session. Misc. security techniques :: steganography, hamming, chaffing, winnowing, shred. Exam details announced. Videos on : Alan Turing, Claude Shannon.
182013-06-20Network security tools : SSH
SSL Explained
16, 172013-06-11Authentication. Testing password strength.
Network security Tools. IPV6, IPSEC, PEM. S/MIME, SET, SSL/TLS.
15a2013-06-12Linux overview. Twin boot concept. Installing Linux/Ubuntu demo. Distributed copies of BOSS Linux.
152013-06-09Authentication principles. Two factor authentication. Biometric authentication. Passwords.
13, 142013-06-07Elementary number theory. Modular arithmetic. Fermat's little theorem, Euler's theorem. Factoring problem. Inverse Logarithm problem. Prime numbers. GCD. Euclidean algorithm and extended Euclidean algorithm.
Overview of RSA algorithm
122013-06-06Overview of some cryptographic standards. Feistel networks. DES, 3DES, IDEA. S box. P box.
112013-06-02Hash digests. Essential properties. md family vs sha family. Merkle Damgard construction. Role of digests in digital signatures. sha3 competition and result. How to build a fortress with hash digest and digital signature.
09, 102013-05-31PGP/GPG. Encrytion, decryption, signing, verfification with GPG. Keys and key management using Command Line. KGPG interface, Thunderbird interface.
082103-05-30Security issues in operating systems. Linux security features.
Introduction to PGP/GPG
072013-05-26Security issues in operating systems. Linux security features. SE Linux.
05, 062013-05-24Asymm. Key Cryptography. Intro: AKC, PKI, PKC, X509. Viginere Cipher, Feistel cipher, Pigpen cipher. Stream cipher vs block cipher. Encryption, signing. Videos: DH key exchange, suitcase analogy.
042013-05-23Symm. Key Cryptography. Demo using zip, vi. Videos -- Ron Rivest, Bruce Schneier.
Distributed copies of course DVD
032013-05-19CE students (56) join the class.
Cryptography fundamental principles.
022013-05-16E-security overview. Threats, remedies.
012013-05-15CS students = 19. Take-off lecture. Course overview.