Kannan Balasubramanian

Dr. Kannan Balasubramanian received a Ph.D degree in Computer Science from University of California, Los Angeles, and the M.Tech degree in computer Science and Engineering from IIT Bombay India and his Msc(Tech) degree in Computer Science from BITS, Pilani, India. He is a Professor at Mepco Schlenk Engineering College, Sivakasi, India. His research interests include Network Security, Network protocols, applications and performance.

Publications

Experiments with the Cryptool Software
Kannan Balasubramanian. © 2021. 9 pages.
Researchers have developed many different types of software for implementing Cryptography algorithms. One such software is Cryptool. This software can be used to demonstrate many...
Problems in Cryptography and Cryptanalysis
Kannan Balasubramanian, Rajakani M.. © 2021. 17 pages.
The integer factorization problem used in the RSA cryptosystem, the discrete logarithm problem used in Diffie-Hellman Key Exchange protocol and the Elliptic Curve Discrete...
Electronic Payment Systems and Their Security
Kannan Balasubramanian, M. Rajakani. © 2019. 16 pages.
Electronic commerce (or e-commerce) can be defined as any transaction involving some exchange of value over a communication network. This broad definition includes...
Security of Identity-Based Encryption Algorithms
Kannan Balasubramanian, M. Rajakani. © 2019. 14 pages.
The concept of identity-based cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP addresses to form public keys with the corresponding...
Algorithmic Strategies for Solving Complex Problems in Cryptography
Kannan Balasubramanian, M. Rajakani. © 2018. 302 pages.
Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues...
Security of Identity-Based Encryption Algorithms
Kannan Balasubramanian, M. Rajakani. © 2018. 10 pages.
The concept of Identity Based Cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP Addresses to form public keys with the corresponding...
Developing Security Enabled Applications for Web Commerce
Kannan Balasubramanian. © 2018. 13 pages.
As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to...
Prevention of SQL Injection Attacks in Web Browsers
Kannan Balasubramanian. © 2018. 35 pages.
Applications that operate on the Web often interact with a database to persistently store data. For example, if an e-commerce application needs to store a user's credit card...
Web Application Vulnerabilities and Their Countermeasures
Kannan Balasubramanian. © 2018. 31 pages.
The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to...
Recent Developments in Cryptography: A Survey
Kannan Balasubramanian. © 2018. 22 pages.
The field of cryptography has seen enormous changes ever since the invention of Public Key Cryptography by Diffie and Hellman. The algorithms for complex problems like integer...
Problems in Cryptography and Cryptanalysis
Kannan Balasubramanian, Rajakani M.. © 2018. 17 pages.
The integer factorization problem used in the RSA cryptosystem, the discrete logarithm problem used in Diffie-Hellman Key Exchange protocol and the Elliptic Curve Discrete...
Variants of the Diffie-Hellman Problem
Kannan Balasubramanian. © 2018. 15 pages.
Many variations of the Diffie-Hellman problem exist that can be shown to be equivalent to one another. We consider following variations of Diffie-Hellman problem: square...
Secure Group Key Agreement Protocols
Kannan Balasubramanian, Mala K.. © 2018. 11 pages.
This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very...
Hash Functions and Their Applications
Kannan Balasubramanian. © 2018. 12 pages.
Cryptographic Hash Functions are used to achieve a number of Security goals like Message Authentication, Message Integrity, and are also used to implement Digital Signatures...
Attacks on Implementation of Cryptographic Algorithms
Kannan Balasubramanian, M. Rajakani. © 2018. 10 pages.
This chapter investigates the implementation attacks on cryptographic algorithms. The implementation attacks can be defined as invasive or non-invasive. The major attack types...
Homomorphic Encryption Schemes: A Survey
Kannan Balasubramanian, Jayanthi Mathanan. © 2018. 14 pages.
Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data. This type of encryption can be used to perform operations on...
Zero Knowledge Proofs: A Survey
Kannan Balasubramanian, Mala K.. © 2018. 13 pages.
Zero knowledge protocols provide a way of proving that a statement is true without revealing anything other than the correctness of the claim. Zero knowledge protocols have...
Cryptographic Voting Protocols
Kannan Balasubramanian, Jayanthi Mathanan. © 2018. 10 pages.
Most of the voting protocols proposed so far can be categorized into two main types based on the approach taken: schemes using blind signatures and schemes using homomorphic...
Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks
Kannan Balasubramanian. © 2018. 11 pages.
To deal with active attacks in public key encryptions, the notion of security against an adaptive chosen ciphertext attack has been defined by Researchers. If an adversary can...
Secure Two Party Computation
Kannan Balasubramanian. © 2018. 9 pages.
The goal of secure two-party computation is to enable two parties to cooperatively evaluate a function that takes private data from both parties as input without exposing any of...
Secure Multiparty Computation
Kannan Balasubramanian, M. Rajakani. © 2018. 13 pages.
The Secure Multiparty computation is characterized by computation by a set of multiple parties each participating using the private input they have. There are different types of...
Secure Bootstrapping Using the Trusted Platform Module
Kannan Balasubramanian, Ahmed Mahmoud Abbas. © 2018. 19 pages.
The protection of Computer Hardware and Software using Cryptographic algorithms has assumed importance in the recent years. The Trusted Computing Group (TCG) has put forward...
Experiments with the Cryptool Software
Kannan Balasubramanian. © 2018. 9 pages.
Researchers have developed many different types of software for implementing Cryptography algorithms. One such software is Cryptool. This software can be used to demonstrate many...
A Software Library for Multi Precision Arithmetic
Kannan Balasubramanian, Ahmed Mahmoud Abbas. © 2018. 33 pages.
The most prevalent need for multiple precision arithmetic, often referred to as “bignum” math, is within the implementation of public key cryptography algorithms. Algorithms such...
Integer Factoring Algorithms
Kannan Balasubramanian, Ahmed Mahmoud Abbas. © 2018. 13 pages.
Most cryptographic systems are based on an underlying difficult problem. The RSA cryptosystem and many other cryptosystems rely on the fact that factoring a large composite...
The Quadratic Sieve Algorithm for Integer Factoring
Kannan Balasubramanian, M. Rajakani. © 2018. 12 pages.
At the time when RSA was invented in 1977, factoring integers with as few as 80 decimal digits was intractable. The first major breakthrough was quadratic sieve, a relatively...
Recent Developments in Cryptography: A Survey
Kannan Balasubramanian. © 2018. 22 pages.
The field of cryptography has seen enormous changes ever since the invention of Public Key Cryptography by Diffie and Hellman. The algorithms for complex problems like integer...
Cryptographic Solutions for Secure Online Banking and Commerce
Kannan Balasubramanian, K. Mala, M. Rajakani. © 2016. 375 pages.
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have...
Attacks on Online Banking and Commerce
Kannan Balasubramanian. © 2016. 19 pages.
With the arrival of the internet, cell phones, e-mail, instant messaging and social networking sites we can do many wonderful things electronically now that make our lives easier...
Electronic Payment Systems and Their Security
Kannan Balasubramanian, M. Rajakani. © 2016. 16 pages.
Electronic commerce (or e-commerce) can be defined as any transaction involving some exchange of value over a communication network. This broad definition includes...
Digital Money and Electronic Check Security
Kannan Balasubramanian. © 2016. 13 pages.
Digital money represents a new payment instrument for e-commerce. More than any other payment instrument, it demands development of a variety of new security techniques for both...
Web Client Security
Kannan Balasubramanian. © 2016. 12 pages.
Although it is possible for a Web client to strongly authenticate a Web server and communicate privately with it (e.g., by using SSL and server-side certificates) not all...
Web Server Security for E-Commerce Applications
Kannan Balasubramanian. © 2016. 9 pages.
Most merchant Web servers are contacted by completely unknown, often even anonymous, users. Thus they cannot generally protect themselves by demanding client authentication, but...
Threats and Attacks on E-Commerce Sites
Kannan Balasubramanian. © 2016. 20 pages.
In this chapter, a detailed knowledge of some of the most devastating attacks against Web applications and common tools in the attacker's arsenal is discussed. There are many...
Implementing a Secure E-Commerce Web Site
Kannan Balasubramanian. © 2016. 23 pages.
The design of a secure e-commerce website, involves process of grouping your systems together in common areas as defined by their requirements for security. These groupings or...
Protecting the E-Commerce Website against DDoS Attacks
Kannan Balasubramanian. © 2016. 30 pages.
A DDoS attack attempts to reduce the ability of a site to service clients, be they physical users or logical entities such as other computer systems. This can be achieved by...
Securing Financial Transactions on the Internet
Kannan Balasubramanian. © 2016. 18 pages.
Securing payment information on the Internet is challenging work. With proper care, attention to detail, and selection and use of the right tools, e-commerce site administrators...
Developing Security Enabled Applications for Web Commerce
Kannan Balasubramanian. © 2016. 13 pages.
As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to...
Prevention of SQL Injection Attacks in Web Browsers
Kannan Balasubramanian. © 2016. 35 pages.
Applications that operate on the Web often interact with a database to persistently store data. For example, if an e-commerce application needs to store a user's credit card...
Web Application Vulnerabilities and Their Countermeasures
Kannan Balasubramanian. © 2016. 31 pages.
The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to...
Security Considerations In Migrating from IPv4 to IPv6
Kannan Balasubramanian. © 2016. 27 pages.
Issues related to IPv6 transition security include transition strategies, tunneling approaches, and considerations on the potential abuse of transition mechanisms. There are...
Implementing Security in Wireless MANs
Kannan Balasubramanian. © 2016. 21 pages.
The wireless metropolitan area networks (WMANs) based on the 802.16 technology have recently gained a lot of interest among vendors and ISPs as the possible next development in...
XML Signatures and Encryption
Kannan Balasubramanian. © 2016. 22 pages.
Many XML uses today need security, particularly in terms of authentication and confidentiality. Consider commercial transactions. It should be clear why purchase orders...
Secure Routing Protocols for Wireless Adhoc Networks
Kannan Balasubramanian, S. Amutha. © 2015. 10 pages.