Engineer Nazeer Ahmad Chaudhry

Profile:http://www.scribd.com/doc/119087715/Profile-Nazeer-Ahmad-Chaudhry
e-mail : nazeerchaudhry1@gmail.com Linkedin , facebook : others Nazeer Chaudhry : Facebook , twitter , Naymzs.com and Linkedin at e-mail : nazeer-chaudhry2@hotmail.com and other at nazeer.chaudhry.79@facebook.com
http://www.linkedin.com/in/nazeerbhatti52 at nazeerchaudhry@yahoo.com , twitter , facebook , sites: http://nazeerchaudhry1.blogspot.com//feeds/posts/default
http://peacepink.ning.com/profiles/blogs/links-sites-publications-2?xg_source=activity
http://www.pic2fly.com/Nazeer+Chaudhry.html

  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo

Comment

You need to be a member of The Queen of The South to add comments!

Join The Queen of The South

Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:24am
  1. 161-174.
    L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.
  2. L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.
  3. L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.
  4. L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.
  5. L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.
  6. L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.
    Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.
  7. L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.
  8. L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997
  9. Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.
  10. Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996
  11. Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002
Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:22am
  1. L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).
  2. L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
  3. Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
  4. L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.
  5. L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.

L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp.

Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:22am
  1. Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages
  2. Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols
    2000. 352 pages.
  3. Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution
    1939. 237 pages.
  4. Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages
  5. Pickover, Clifford, Cryptorunes, 2000. 96 pages
  6. Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.
  7. Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.
  8. Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.
  9. Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages
  10. Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages
  11. Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.
Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:21am
  1. Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007
  2. Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages
  3. Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages
  4. Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.
  5. Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages
  6. Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages
  7. Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers
    Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages
  8. Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.
  9. Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,
Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:20am

Bibliography

  1. Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
  2. Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach,  1998, Publishers: The Mathematical Association of America,
  3. Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)

 

  1. Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
  2. Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)
  3. Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
  4. Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US
  5. Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages
  6. Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages
  7. Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009
Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:19am

Encryption and Security

Most encryption involves a key and a set of steps or a procedure known as an algorithm . The key is an item of information used repeatedly in the algorithm while the message (called plaintext, even if it is sound or pictures) is being encrypted. The key customizes the algorithm. It is used with the algorithm for encoding and again later for decoding an entire message. If one knows the algorithm and the key, retrieving the plaintext from an encoded message is easy.

Encryption systems fall into one of two main categories. In symmetrickey encryption, the key is the same for the encryption of the message as for the decryption: that is, both the encoder and the decoder know and use the same key. In asymmetric or "public-key" encryption, the key provided to the decoder is not the same as the encoder's key.

The transmission of symmetric-key encryptions is safe provided that nobody besides the sender and intended receiver obtains the key. However, the problem in security arises from the difficulty of securely transferring the key so that those receiving the encrypted message are able to decrypt it. Asymmetric keys minimize this problem because a public-key cryptosystem uses a pair of keys—a private key that remains with the encryptor, and a public key that is openly available to all users, thus eliminating the need to transfer a key in secrecy

Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:18am

N.A. Chaudhry, Engineer Hasan Nazeer Chaudhry  M.S. ( Electrical Engg.), B.E. ( Computer Engg.)  , Sonia

Section 4.1: Ancient Cryptology

Section 4.2: Unbreakable Ciphers

Section 4.3:Modified  Block Cipher

Section 4.4:Caesar Cipher

Section 4.5:Changing Key Cipher

Section 4.6:IVC Black Chamber

Section 4.7:Simulated Code Book

Section 4.8: Decrypted Secrets

Section 4.9:Simulated Poly-alphabetic Substitution

 

Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:17am

Chapter 4:
Evolution of Cryptanalysis Algorithm   (p 127-191)

N.A. Chaudhry, Engineer Hasan Nazeer Chaudhry  M.S. ( Electrical Engg.), B.E. ( Computer Engg.)  , Sonia

Section 4.1: Ancient Cryptology

Section 4.2: Unbreakable Ciphers

Section 4.3:Modified  Block Cipher

Section 4.4:Caesar Cipher

Section 4.5:Changing Key Cipher

Section 4.6:IVC Black Chamber

Section 4.7:Simulated Code Book

Section 4.8: Decrypted Secrets

Section 4.9:Simulated Poly-alphabetic Substitution

 

 

Summary    ( SizeK)

Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:17am

Section2.5:Harappan Civilization

Section2.6: Confirmation of Conclusions

Section2.7:Terminal Symbols

Section2.8: Bibliography

Summary  |  Full Text: PDF (Size: 3924K)

Chapter 3:
Introduction to Cryptanalysis   (p 1-24)
N.A. Chaudhry  , Farzana Kulsum M.S (Telecomm. Engg.) , B.E. ( Computer Engg.),  Julia

Section 3.1 :Historical Perspective 
Section :3.2 Substitution Cipher
Section 3.3:Modified Polybuis Square
Section 3.4:Skytale Cipher
Section 3.5:Evolution of Basic Procedures
Comment by nazeer ahmad chaudhry on August 16, 2013 at 4:16am

Frontmatter (p i-xix)
Summary |  Full Text: PDF (Size: K
Chapter 1:
Introduction

Ahmad Hasan Dani ,N.A. Chaudhry ,  Sony

Summary  |  Full Text: PDF (Size: 3924K)

Chapter 2:
Evolution of Ethno-Archaeological Model    (p 1-11)
Nazeer.Ahamd Chaudhry  , Farhat Yasmeen , Eva

Section2.1:Introduction

Section2.2:Pre-Historical Perspective

Section2.3:Pre- Harappan Culture.

Section2.4:Harappan Culture

© 2024   Created by Soleilmavis.   Powered by

Report an Issue  |  Terms of Service