Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
RESUME a) Name of the Candidate: Addepalli V.N.Krishna b) Permanent Address: H.NO: 1-9-219 (New), 8-91/1 (Old), NEW DILSUKHNAGAR COLONY, HYDERABAD 500060. B-7, NET Staff QTRS, Navodaya Nagar, Raichur. Present Address c) Date of Birth: 26-06-65 d) E mail address: [email protected] e) Contact telephone : Mobile : 09849520995 07899966787 Earlier position: Principal & Professor of Computer Science & Eng.. Pujya Shri Madhavanji College of Engineering & Technology, Hyderabad. Ratified by JNTUH, Hyderabad as Principal, Nov 14. API Score accepted by JNTUH > 400. Present position Working as Professor & Head, CSE Dept., Navodaya Institute of Technology, Raichur. f) Academic Qualifications Qualification Discipline Ph.d Computer Science & Engg. M.Tech Computer Science M.E Mechanical B.E Mechanical Intermediate M.P.C University Status Acharya Nagarjuna University Birla Institute of Technology, Mesra, Ranchi Shivaji University, Maharastra Osmania University, Hyderabad. Intermediate Awarded Year of Passing 2010, March 79% 2001,April 70% 1994, April 77% 1987,July 79.2% 1982 S.S.C. board, Andhra Pradesh. Mathematics(Main) Secondary board, Andhra Pradesh. 68.5% 1980 g) Details of Research/Training Experience: 1. Worked as Professor of Computer Science & Engg at Staley College of Eng. & Tech. for Women, Hyderabad from Dec 14 –June 15. 2. Worked as Professor of Computer Science & Engg. and Principal at Pujya Sri Madhavanji College of Engg. & Tech., Hyderabad from July 2010 –Nov.2014. 3.Worked as Professor in Computer science, Indur Institute of Engineering and Technology, Siddipet, Medak dist., Andhra Pradesh, India from 2004 July-2010 June. 4. Earlier worked as Head, Associate professor, Jyothismati Institute of Tech. & Science, Karimnagar, A.P., from March 2000- June 2004. 5. Worked as Asst. professor in GNITS, Hyd. from Nov. 1997 –Feb. 2000. 6. Worked as lecturer in VSCE, Khammam from Aug 1996-Oct 1997. 7. Worked as Lecturer in GPREC, Kurnool from Aug 1994-May 1996. 8. Worked as Site Engineer in Vigneswara Engineering and Arudra Engineers between 1988-1992. Guiding 3 PhD students for their Doctoral studies. One student is about to submit his thesis in 2016 June. Involvement with WASE Program (WIPRO ACADEMIC SOFTWARE ENGINEERING) a Collaborative Program between WIPRO TECHNOLOGIES & BITS, PILANI. Handled subjects like Computer Organization and Database Management Systems, Computer Networks & Network Security since 2004 as a member technical staff. Projects done 1“ Some encryption algorithms in pager environment”. The work has been done in partial fulfillment of project work for M.Tech, Computer Science. 2. “Inverse Heat Conduction technique in estimation of heat transfer through Rocket nozzle throat”. Work has been done in partial fulfillment of project work for M.E., (Mechanical) in Defence Research & Development Labs, Hyderabad. 3. “Performance evaluation of New Encryption Models with emphasis on Probababilistic Encryption and Time stamp in network security”, has been submitted in fulfillment of Ph.D program. h) Details of Papers Published: international repute. 29 papers published In Journals of national and i) Awards /Medals/ Honors Received 1. Stood first in the school in S.S.C 2. A valid GATE score of 90 percentile in Mechanical discipline. 3. Stood as best lecturer in G.N.I.T.S. (Eng. College) during 1997-1998 & 1998-1999. 4. Received Grant in Aid from A.I.C.T.E., to attend International conference, ICTTA 06, Syria. I , Addepalli.V.N.Krishna, Certify that the above information given by me is correct to the best of my knowledge and belief. I strongly believe that a teacher has to continuously upgrade his knowledge and continue in research activities which helps him to be a better teacher. He imbibe not only knowledge but also discipline, dedication and moral values to the student community which makes them not only technocrats but also good human beings who can be a part in developing the country. Avnkrishna References 1. Dr.S.Krishna Murthy, Associate Professor, Applied Mathematics dept. Defence Institute of Advanced Technology, Pune , India. [email protected] 07798066628 2. Prof. EVLN Rangacharyulu, Professor, Dept. of ECE, Gitanjali college of eng. & Tech., Hyderabad. [email protected] 07799033876 Papers published in Journals of National & International Repute. ----------------------------------------------------------------------------------------------------------1. Krishna. A.V.N : “ A New algorithm for Random number generation in network security”, Journal for scientific & Industrial Research, Vol 64, Oct 2005, pp 791-793. 2. Krishna A.V.N., S.N.N.Pandit: “A new Algorithm in Network Security for data transmission”, Acharya Nagarjuna International Journal of Mathematics and Information Technology, Vol: 1, No. 2, 2004 pp 97-108. 3. Krishna A.V.N., A.Vinaya Babu: “Web and Network Communication security Algorithms”, Journal on Software Engineering, Vol 1,No.1, July 06, pp 12-14 . 4. Krishna A.V.N, S.N.N.Pandit, A.Vinaya Babu: A generalized scheme for data encryption technique using a randomized matrix key, Journal of Discrete Mathematical Sciences & Cryptography, Vol 10, No. 1, Feb 2007, pp73-8, IF Still computing, 2013 5. Krishna A.V.N, A.Vinaya Babu: Pipeline Data Compression & Encryption Techniques in e-learning environment, Journal of Theoretical and Applied Information Technology, Vol 3, No.1, Jan 2007, pp37-43. 6.Krishna A.V.N, A.Vinaya Babu: A Modified Hill Cipher Algorithm for Encryption of Data in Data Transmission, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2007 !N0. 3(14) pp 78-83. 7.Krishna A.V.N, A.Vinaya Babu: Training of new probabilistic encryption scheme Using a optimal key, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2009 !N0. 2 pp 24-34. 8.A.V.N. Krishna, A.Vinaya Babu: A new mathematical model in encryption mechanism with time stamp and acknowledgement support, International journal of Network Security, Vol.11, No.3, PP.172-176, Nov. 2010 9 A.V.N. Krishna :A new variable length key for encryption mechanism in network security, Journal of Computer Science, Jan - Feb 2010, Volume 4 Issue 2, pp 1423-1426 10.A.V.N. Krishna : Role of Statistical tests on New algorithms in network security, International Journal on Advancements in Technology”, Vol 1, No.1 June 2010, pp 1325. 11.A.V.N. Krishna: A New non linear model in encryption mechanism with time stamp and acknowledgement support, International journal of Network Security, Vol.13, No.3, pp 202 -207, Nov. 2011 12. A.V.N. Krishna: A Mathematical model for Temporal data mining in estimation of traffic data over a busy area, Journal on Software engineering, Vol 1, No.3, Jan-Mar 2007, pp 50-54. 13: A.V.N. Krishna: A Spatial Regression Analysis model for temporal data mining in estimation of house hold data through different states in India, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2009 !N0. 2(19) pp 6368. 14. A.V.N.Krishna: A Spatial regression Analysis model in estimation of traffic data over a busy area, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2007 !N0. 3(14) pp 78-83. 15. A.V.N.Krishna: A Mathematical model for estimation of Rural house hold data through different states in INDIA, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2009 !N0. 1(18) pp 51-57. 16. A.V.N.Krishna: Decision Support systems in estimation of heat transfer in rocket nozzle throat, Atti della Foundation Giorgio Ronchi, Anno LXIII, n. 5, Sep-Oct 2008, pp 607-615. 17. A.V.N.Krishna : A new non linear Mathematical model with feedback mechanism in Encryption Mechanism: International Journal on Advancements in Technology (IJOAT), Vol1, No2, Oct 2010, pp 197-204 18. A.V.N.Krishna: Effect of Noise on Encryption mechanisms in MANET & WSN Environments: International Journal on Advancements in Technology (IJOAT), Vol 2, No1, Jan 2011 pp 14-21 19. A.V.N.Krishna: Probabilistic Encryption Based ECC Mechanism, International Journal on Advancements in Technology (IJOAT), Vol 2, No 2 (April 2011) pp 257- 268. 20. A.V.N.Krishna: An Improvised ECC With probabilistic approach, Information Security Journal, a Global perspective, Volume 21, Issue 1, 2012 , pp 28-35, IF Still computing 2013 21. A.V.N.Krishna: Time Stamp Based ECC Encryption and Decryption, International Arab Journal of Information Technology (IAJIT), Vol. 11, No. 3, May 2014, Impact factor 0.127. 22. AVN Krishna, K.Madhura vani: A Modified Hill Cipher using Randomized Approach, International Journal of Computer Network and Information Security (IJCNIS), Vol.4, No.5, June 2012 , pp 56-62 . 23. AVN Krishna: A simulation study , A model for comparative of ANALYTICAL AND NUMERICAL methods in computing temperature distribution and Heat transfer through Rocket Nozzle Throat, International Journal of Systems & Technologies, IJST KLEF, 2010, Vol. 3, No. 2, pp 185-191. 24. AVN Krishna: Probabilistic (Multiple Cipher) Based ECC, Journal of Discrete Mathematical Sciences & Cryptography, 15(2012), Issue No. : 06 (December) 25. AVN Krishna, S.Krishna Murthy: A Simulation method to Study the Heat transfer In Rocket nozzle throat By Inverse Heat Conduction technique, Journal of Indian research Vol. 1, No. 3, 2013. 26. AVN Krishna, S.Krishna Murthy: Inverse heat conduction in Rocket Nozzle throat by multiple sensors &future time steps , International journal of Mathematical Modeling, Simulation & applications(IJMMSCA), vol 5, No.3, 2012. 27. A.V.N.Krishna, A.Hari Narayana, K.Madhura Vani: Fully Homomorphic Encryption with Matrix based Public Key Crypto Systems, Journal of Network and Information Security, Volume 3 Issue 1 June 2015. 28. A.V.N.Krishna, A.Hari Narayana: Cubic Spline Curve Public Key Cryptography, Accepted in Journal of Discrete Mathematical Sciences and Cryptography. 29. A.V.N.Krishna, A.Hari Narayana, K.Madhura Vani: Fully Homomorphic Encryption with Matrix based Digital Signature Standard, Accepted in Journal of Discrete Mathematical Sciences and Cryptography. Chapters Accepted 1. A.V.N.Krishna: A Randomized Cloud Library Security Environment, Cloud Computing and Virtualization Technologies in Libraries, IGI Global publications, USA. Papers presented in International Conferences 1. AVN Krishna et. al “A New algorithm for Network security”, International conference on Current trends in Information Technology, MERG 05, Oct. 1-3, pp 178-179. 2. AVN Krishna et al “A new minimized Probabilistic encryption algorithm for Data transmission”, International conference on Information Security & Computer Forensics, ISCF 06, pp 27-32. 3. AVN Krishna, A.Vinaya Babu” An improvised probabilistic encryption scheme using a selective Matrix key’, IEEE IACC-09, 6-7 March pp 76-81. 4. AVN Krishna “ Temporal Data Mining in estimation of Empirical formula for House Hold data analysis”, IJCAI-07, Workshop on Spatial & Temporal Reasoning, Jan 6-7. 5. Adi Narayana Reddy K, Vishnuvardhan B, Krishna A V N, Madhuviswanatham : A Modified Hill Cipher Based on Circulant Matrices, accepted in C3IT-2012. National Conference: 1.AVN Krishna, SNN Pandit “ A new algorithm for internet security”, Proceedings of National Conference on E Learning , Challenges & opportunities in Indian context, 2004, pp 189-194. 2. AVN Krishna et. Al “ A non linear optimized analysis of temperature distribution in estimation of Heat transfer through Rocket nozzle Throat”, National conference on Computational methods in Mechanical Engineering( COMPUTIME 05), Sep 05, pp 213215. 3. AVN Krishna, SNN Pandit “ Study of some Probabilistic algorithms in Network security’, National conference on Emerging trends in Computer science & Engineering, 6-7 Jan 2006. 4. AVN Krishna, A.Vinaya Babu, “ Pipe line Data Compression & Encryption Techniques in E learning environment”, All India seminar on Role of Telecommunications for betterment of society, July 15-16, 2006. Session Chair International Conference as Chair-Technical Session International Conference on Innovations in Computer Science & Engineering (ICICSE – 2014 & 2015) Hyderabad. Guest lectures Presented 1. A.V.N.Krishna: Workshop on “ Object oriented Analysis & Design”, at Indur Institute of Engineering & Technology, Siddipet, 30/06/2010. 2. A.V.N.Krishna: workshop on “ Role of Security Mechanisms in Communication systems”, at Gurunanak Institute of Technology, 07/08/10. 3. A.V.N.Krishna: Workshop on “Information Security Technologies” at JNTUH, 21/01/12. 4. A.V.N.Krishna: Talk on “ Network security concepts with emphasis on Probabilistic encryption and time stamp”, at Defence Institute of Advanced Technology, Pune 05/02/13. Research area: 1. Time stamped Mathematical Model based ECC Mechanism in Cloud Environment Cloud computing is leading the technology development of today’s communication scenario. This is because of its cost-efficiency and flexibility. In Cloud computing vast amounts of data are stored in varied and distributed environment & security to data is of prime concern. The security concept to data involves the primary concern. Elliptic Curve Cryptography provides a secure means of message transmission among communicating hosts using Diffie Hellman Key Exchange algorithm or ElGamal algorithm. In the implementation of Elliptic Curve Cryptography (ECC), the message is transformed into an affine point on the EC. Thus, by having key lengths of 160 bits, the ECC algorithm provides sufficient strength against crypto analysis and whose performance can be compared with standard algorithms like RSA with a bit length of 1024 bits. In the present work, the plain text is converted to cipher text using ECC algorithm. Instead of generating the cipher text as (C1 & C2), it is generated as C1 only by using probabilistic model on ECC. As the proposed model is intended to be used in Cloud environment, a new non- linear mathematical model is also used which considers a variable nonce value and a dynamic time-stamp to generate a distributed sequence. The value of sequence is multiplied with output of ECC algorithm to protect the data from hackers which is stored in central servers. While the data is being retrieved from the servers, a query is being used which uses the mathematical model to search for the data which is still in encryption form. Final decryption takes place only at user’s site by using the private keys. Thus the proposed model provides the fundamental security services like Authentication, Security and Confidentiality to the transmitted message & also provides sufficient strength against Crypto analysis in Cloud environment. By considering a feedback mechanism for private key generation, the strength of the proposed model can be increased still further. The model can also be studied for increased performance against unavoidable factors like noise. Depending on the amount of memory requirement, one can analyze the use of probabilistic time stamped non linear mathematical model based ECC in small memory devices like smart cards and mobile devices. One can try using randomized pseudo random number generators for choosing the secret integer k, and the private key nB. ECC is a vast field where there is large scope for higher research. And also work to be carried on different algorithms used in Scalar multiplications of ECC algorithm and also to use Frobenius expansions in ECC calculations which reduces the computational overhead of the proposed model. The work will be extended to Hyper elliptic curves and a comparative study to be made between ECC & Hyper ECC in terms of complexity, Computing power & Security. 2. Cubic Spline Curve Public Key Cryptography In this work, a cubic spline curve is considered for Asymmetric mode encrypting data. A steady state, one dimensional equation is integrated over a control volume. The derivatives of above equation form piece wise linear profile, which leads to discretization equation with corresponding weights. These weights are initially solved to generate global variables. Those global variables are used to calculate public key which in turn use the ElGamal mode of encryption. The proposed algorithm supports the features like Authenticity of users, Security & Confidentiality of data transmitted. Going by the construction of the algorithm, Encryption is being done on blocks of data for which it consumes less computing resources. Going by complexity of the algorithm, the key length needed is about 120 bit length to provide sufficient strengths against cryptoanalysis. Teaching interests. 1.Cryptography & network security 2 Relevance of CURVE BASED CRYPTOGRAPHY 3. Computer networks 4. Data base management systems The institute is a prestigious institute of National importance. Working in such an organization will help me in developing my personality and character. It gives me a unique opportunity to share my knowledge with one of the best minds. I want to establish a laboratory on Information security with emphasis on CURVE BASE CRYPTOGRAPHY where research work can be undertaken at National and International level. Dr. A.V.N. Krishna, Professor & Head, CSE Dept., Navodaya Institute of Technology, Raichur, guiding 3 Ph.D students for their Doctoral studies. Many Papers published In Journals of national and international repute and attended many national and international conferences.