Mr. Chandan Kumar Giri
Associate Professo
Department of Engineering & Technology
Centurion University of Technology and Management
India
Biography
I am in the field of Teaching from 2006 after completing Bachelor of Engineering in Computer Science and Engineering from North Orissa University, Odisha in the year 2004. JITM was the 1st Institute where I started my career as a Teacher with more than 4 years of Teaching Experience as a Lecturer. I have completed M.Tech. from Berhampur University, Odisha, subsequently 4 years of Teaching Experience as an Asst. Professor in the Department of Computer Science & Engineering, SoET, CUTM Paralakhemundi. I had taught different UG courses like Cryptography & Network Security, Operating System, Computer Network, Parallel Distributed System, Computer Graphics and Multimedia Technology and Real Time System in PG.
Research Interest
Interest Cloud Computing Cryptography & Network Security Cryptography & Network Security Operating System Computer Network Cryptography & Network Security Operating System Computer Graphics
Publications
-
Publication 1 Title: Improvising Security Issues using quantum Cryptography Publisher: IJCAT Date: Date/10/1914 Volume: Volume 1 Issue 9 ISBN: 2348-6090 Author: Chandan Kumar Giri Description: Stegnography is the technique of hiding confidential information within any media. In recent years various stegnography methods have been proposed to make data more secure. At the same time different steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied over the years. Various tools for detecting hidden information are easily available over the internet, so securing data from steganalyst is still considered a major challenge. While various work have been done to improve the existing algorithms and also new algorithms have been proposed to make data behind the image more secure. We have still been using the same public key cryptography like Deffie-Hellman and RSA for key negotiation which is vulnerable to both technological progress of computing power and evolution in mathematics, so in this paper we have proposed use of quantum cryptography along with stegnography. The use of this combination will create key distribution schemes that are uninterceptable thus providing our data a perfect security. Publication 2 Title: Performance Analysis of Data Encryption Algorithms Publisher: Date: Date/1/2015 Volume: ISBN: Author: Chandan Kumar Giri Description: Publication 3 Title: A New Approach of Data Aggregation in Wireless Sensor Networks Publisher: International Journal of Computing and Technology Date: Date/10/1914 Volume: Volume 1 Issue 9 ISBN: 2348-6090 Author: Chandan Kumar Giri Description: Algorithms that allow the concealed data aggregation (CDA) in wireless sensor networks. It describe and evaluate three algorithms that were reported to suit to the WSN scenario. As result of the evaluation, where we emphasize the awareness to potential attack scenarios, It gives a brief overview of strengths and weaknesses of the algorithms. Since no algorithm provides all desirable goals, The propose two approaches to cope with the problems where the first is successive combination of two algorithms. It increases security, while the additional efforts can be minimized by carefully selected parameters. For the second approach is face specific weaknesses and engineer mechanisms that solve the particular issues. With the considered homomorphic message authentication code and a discussion of the id-issue we exemplary evaluate the two biggest issues of the very promising CMT algorithm. Publication 4 Title: Role of Different Cryptographic Algorithms in Information Security on Web Publisher: IJEMR Date: 25/10/2016 Volume: Volume 6 Issue 5 ISBN: 2394-6962 Author: Chandan Kumar Giri Description: In Today’s high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Information security is the most common need of the people all over the world. Cryptography provides necessary data security by providing different algorithms.So here we will analyze different algorithms for information security on web.