Profile:http://www.scribd.com/doc/119087715/Profile-Nazeer-Ahmad-Chaudhry
e-mail : nazeerchaudhry1@gmail.com Linkedin , facebook : others Nazeer Chaudhry : Facebook , twitter , Naymzs.com and Linkedin at e-mail : nazeer-chaudhry2@hotmail.com and other at nazeer.chaudhry.79@facebook.com
http://www.linkedin.com/in/nazeerbhatti52 at nazeerchaudhry@yahoo.com , twitter , facebook , sites: http://nazeerchaudhry1.blogspot.com//feeds/posts/default
http://peacepink.ning.com/profiles/blogs/links-sites-publications-2?xg_source=activity
http://www.pic2fly.com/Nazeer+Chaudhry.html
Comment
L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp.
Bibliography
Encryption and Security
Most encryption involves a key and a set of steps or a procedure known as an algorithm . The key is an item of information used repeatedly in the algorithm while the message (called plaintext, even if it is sound or pictures) is being encrypted. The key customizes the algorithm. It is used with the algorithm for encoding and again later for decoding an entire message. If one knows the algorithm and the key, retrieving the plaintext from an encoded message is easy.
Encryption systems fall into one of two main categories. In symmetrickey encryption, the key is the same for the encryption of the message as for the decryption: that is, both the encoder and the decoder know and use the same key. In asymmetric or "public-key" encryption, the key provided to the decoder is not the same as the encoder's key.
The transmission of symmetric-key encryptions is safe provided that nobody besides the sender and intended receiver obtains the key. However, the problem in security arises from the difficulty of securely transferring the key so that those receiving the encrypted message are able to decrypt it. Asymmetric keys minimize this problem because a public-key cryptosystem uses a pair of keys—a private key that remains with the encryptor, and a public key that is openly available to all users, thus eliminating the need to transfer a key in secrecy
N.A. Chaudhry, Engineer Hasan Nazeer Chaudhry M.S. ( Electrical Engg.), B.E. ( Computer Engg.) , Sonia
Section 4.1: Ancient Cryptology
Section 4.2: Unbreakable Ciphers
Section 4.3:Modified Block Cipher
Section 4.4:Caesar Cipher
Section 4.5:Changing Key Cipher
Section 4.6:IVC Black Chamber
Section 4.7:Simulated Code Book
Section 4.8: Decrypted Secrets
Section 4.9:Simulated Poly-alphabetic Substitution
Chapter 4:
Evolution of Cryptanalysis Algorithm (p 127-191)
N.A. Chaudhry, Engineer Hasan Nazeer Chaudhry M.S. ( Electrical Engg.), B.E. ( Computer Engg.) , Sonia
Section 4.1: Ancient Cryptology
Section 4.2: Unbreakable Ciphers
Section 4.3:Modified Block Cipher
Section 4.4:Caesar Cipher
Section 4.5:Changing Key Cipher
Section 4.6:IVC Black Chamber
Section 4.7:Simulated Code Book
Section 4.8: Decrypted Secrets
Section 4.9:Simulated Poly-alphabetic Substitution
Summary ( SizeK)
Section2.5:Harappan Civilization
Section2.6: Confirmation of Conclusions
Section2.7:Terminal Symbols
Section2.8: Bibliography
Summary | Full Text: PDF (Size: 3924K)
Chapter 3:
Introduction to Cryptanalysis (p 1-24)
N.A. Chaudhry , Farzana Kulsum M.S (Telecomm. Engg.) , B.E. ( Computer Engg.), Julia
Section 3.1 :Historical Perspective
Section :3.2 Substitution Cipher
Section 3.3:Modified Polybuis Square
Section 3.4:Skytale Cipher
Section 3.5:Evolution of Basic Procedures
Frontmatter (p i-xix)
Summary | Full Text: PDF (Size: K
Chapter 1:
Introduction
Ahmad Hasan Dani ,N.A. Chaudhry , Sony
Summary | Full Text: PDF (Size: 3924K)
Chapter 2:
Evolution of Ethno-Archaeological Model (p 1-11)
Nazeer.Ahamd Chaudhry , Farhat Yasmeen , Eva
Section2.1:Introduction
Section2.2:Pre-Historical Perspective
Section2.3:Pre- Harappan Culture.
Section2.4:Harappan Culture
© 2025 Created by Soleilmavis.
Powered by
You need to be a member of The Queen of The South to add comments!
Join The Queen of The South