Rabin Cryptosystem is an asymmetric key cryptography algorithm

advertisement
RESUME
SAI KRISHNA MOTHKU
Post Graduate Student
M.Tech (Computer Science -Information Security)
NIT -Surathkal
Contact no: 09885648901
Email: sai05.kits@gmail.com
AREAS OF INTEREST
1.
2.
3.
4.
C and Data structures
Algorithms
Information Security
Operating System
TECHNICAL SKILLS




Programming Languages: C, C++, Java.
Software: MATLAB.
Operating System: UNIX, WINDOWS XP.
Tools: Exposed and used extensively networking tools NS2.
EDUCATIONAL AND EXPERIENCE DETAILS





1 year teaching experience in GITAM UNIVERSITY as Asst.Professor.
June 2012: Earned M.Tech Certificate in Computer Science -Information Security from NITSurathkal with CGPA 6.92
May 2009: Earned Bachelor of Technology Certificate from KAKATIYA UNIVERSITY with 65.89%
aggregate.
May 2004: Earned Intermediate Certificate from Board of Intermediate Education AP with 90.7%
aggregate.
May 2002: Earned Secondary School Certificate from Board of Secondary Education AP with
82.66% aggregate.
INTERNSHIP
Internship under Professor Dr.Atul Negi on paper titled "Hierarchical SubXPCA and generalized
feature partitioning approach to principal component analysis" duration from May 16th, 2011 to
July 15th, 2011 Worked on Matlab.
ACADEMIC PROJECTS



Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the
Server Side:
The project is about finding the mitigation technique for Cross Site Scripting Attack on the server
side.
Cheating Detection and Cheater Identification in Secret Sharing Schemes:
The purpose of this project is to implement the secret sharing scheme and to detect whether
cheating has been occurred during the reconstruction of the secret and also it detects who the
cheater is.
Rabin cryptosystem:
Rabin Cryptosystem is an asymmetric key cryptography algorithm whose security, like that
of RSA, is related to the difficulty of factorization.
MAJOR PROJECT

Detection of Sybil attack in Wireless ad-hoc networks:
In a Sybil attack, a malicious node can generate and control a large number of logical
identities on a single device. This gives the illusion to network as these are different legitimate
nodes. In this Project; I proposed a mechanism for detecting the Sybil attack. Blocking the Sybil
node after detecting and comparing the performance metrics like throughput, packet delivery
ratio among without Sybil attack, with Sybil attack and Sybil attack with my detecting
mechanism. I implemented the project in NS2 using AOMDV routing protocol.
PERSONAL DETAILS



Father’s Name: GURUMURTHY MOTHKU
Permanent Address: #16-86/1,
REDDY COLONY, RAMAYAMPET,
MEDAK, ANDHRA PRADESH,PIN- 502101.
Hobbies:
- Listening music.
- Social networking.
I HERE BY DECLARE THAT THE ABOVE WRITTEN PARTICULARS ARE TRUE TO THE BEST OF MY
KNOWLEDGE AND BELIEF.
SAI KRISHNA MOTHKU
Download