SUMANKUMAR PRAMANIK,Research Engineer, C-DOT sumankumar.pramanik@alumni.cse.iitk.ac.in -------------------------------------------- ============================================ Professional Details : ----------------------- 1.I am working in Signalling in ATM Networking Technology from July'2002 in C-Dot. My Interests : Object Oriented Design Methodology 2.I worked as Senior Project Associate from May,02-July'02 in dept. of CSE, IITK Work details : Designing Tests for testing randomness of Large size Pseudorandom Permutation Generator. Tools/API/Langue/Platform :C,C++ in Linux. ----------------------------------------------------------------------------- Academics ----------------------------------------------------------------------------- Mtech 2002 IIT Kanpur in Comp. Science and Engg. Btech 2000 Calcutta University in Comp. Science and Engg. ------------------------------------------------------------------------------ List of Projects done in IITK : ------------------------------------------------------------------------------ 1. Embedded System based Project in Esterel, Verilog: Tools/API/Language/Platform : Esterel for Behavioral Description ----------------------------- HDL : Verilog in Linux system Name : Behavioral Design of Elevator Controller with Esteral and High Level Design with Verilog Coding. Details : Here, i made a Behavioral Design for an Elevator Controller using Esteral. And the design was taken as Behavioral Specification for the Elevator Controller, and we had a High Level Design of the Elevator Controller using Verilog. The lift can control speed when floors comes, lift has intelligency to go fast when the floor to reach is far away.The doors has intelligency to get closed after certain time but a obstacle on door can close it automatically and continues to close periodically and srops by closing it. The lift can raise alarm on over-weight. The lift can be configured to adjust any number of floors. 2. C and Assembly Programming on Pentium-II based Project Tools/API/Language/Platform : C in Linux, tools : gdb ------------------------------ Name : Implementing Buffer Overflow situation for the functions like scanf(%s,...),gets() in Pentium-II Processor Assembly language, C language in Linux system. Details : A C program taking input a string using gets()/scanf(%s..) is input with a string full of assembly codes which is malicious in nature in the sense that the string is so long that it over-writes the return address( from the function gets()/scanf(%s..) to C program) with a jump instruction into the string , so when it's time to return to C program in context after taking input, the jump instruction gets executed and the the assembly codes began to executes and gives execution of a new executable( written via the assembly codes in the input string) which has owner that of the C program in context. 3. Distributed System and mobile computing, Graphical User Interface(with Java) based Project Tools/API/Language/Platform : Java for GUI, Java for Network Programming ---------------------------- in Linux, Implementation of Rover Distributed Filesystem Name : A Mobile e-mail Application with Rover File System ( Used in Distributed Systems ) for Mobile Devices like Laptop, Palm top etc.( with Java in Linux) Details : The e-mail client running on Laptop/palmtop can download the mails from the mailserver when it gets connected to the mailserver through internet/ethernet. 4. Parallel Computing Based Project in C and PVM3.0 Tools/API/Language/Platform : C in Linux, tool : PVM3.0 running in LAN ----------------------------- Name : Implementation of Pvm_Send() : An Universal Function for Parallel Virtual Machine(PVM3.0) Which Can Recognize the Network Easily and Send Data Over it Accordingly.( with C in Linux) Details : Original pvm_send() of PVM3.0 does not check the connectivity of source and destination when called to send data from source to destination. A large project for parallel computing written using pvm_send() never shows at the first glance which kind of connectivity network is used for computation. Pvm_Send() overcomes these two major drawbacks of pvm_send(). ------------------------------------------------------------ | Pvm_Send() can be obtained by contacting Phalguni Gupta, | | Department of Computer Science and Engineering, IIT Kanpur,| | UP, India, PIN-208016, email pg@cse.iitk.ac.in | ------------------------------------------------------------ 5. OS and Network Security Based Projects in C: Tools/API/Language/Platform : C in Linux system ---------------------------- A. Secure Shell : ssh, Secure Shell for Linux System( with C in Linux) A Public Key and Private Key based secure protocol to get a secure shell ( as compared to normal shell got from telnet/rlogin) from a remote terminal was done. B. Port Scanner : It scans all the TCP/IP ports to check which applications are going on the ports/which are busy of it's target machine.(C in Linux) C. Trozen Horse : A fake game got through email when played says after sometime : system rebooted, and gives a fake system rebooting scenario in standard output, and gives a fake login screen(making all fake things intelligently , so that it gives intution of original happenings, and as user gives login and password, it takes the login and password, mails it to the sender of the game, and sends a copy of itself to a neighbouring machine with a welcome message of playing a new game, and really reboots the system. D. Blue Screen of Death : (For Windows, Linux never Dies through these stupid attack!) It starts sending random TPC/IP Packets to a target machine on the available ports and makes the machine so busy in checking packets it goes to die after sometime. 6. Interactive Graphics Oriented Project with OpenGL Tools/API/Language/Platform : C in Linux, Tools/Package : OpenGL. ----------------------------- Making of Arabian Pot with Peak by Polygon Mesh Solid Modeling( with OpenGL in Linux) Polygon Mesh was the building model, and some operations on the points like point_moving&rotating_outside/inside, point_moving_towardsXYZvector was implemented to give the building model different required shapes, 7. Web Technology and E-commerce Based Project Tools/API/Language/Platform : Flash, HTML, Javascript for front-end. ------------------------------Java Servlet, SSL for backend. JDBC as API to database. SQL server for backend Database. Java for writing chatting facility. Name : Implementation of a Web site for Stock Exchange Details : 3-Tier Architecture with the work of Flash, javascript, HTML in front End, online collaboration facilities for Customer relationship, Secured high performance back-end Database Server, Secured connection facilities from clients through SSL, Message board, Newsgroup facilities, Secure online transaction with Master Card etc. Top Class personalization, high performance database management in back end. 8. Cryptography Based Project Finding a way to break Speech Cipher. Details Below. -------------------------------------------------------------------------------- MTech Thesis : Finding a Way to Break Speech Ciphers -------------------------------------------------------------------------------- Supervisor: Prof. Manindra Agarwal, Department of Computer Science and Engineering, IIT Kanpur Area : Cryptography, Stream Ciphers Abstract : Speech is encrypted and send between two parties in many situations. In such cases, it's sometimes important to know the speech going on between two parties. Linear Feed Back Shift Register(LFSR) is a good way of encrypting speech. If the linear complexity of the LFSR is finite and not large, the speech data send has a simple encoding technique, then the speech cipher can be efficiently broken exploiting the redundancy in the speech data and without knowing the key for LFSR generated bit streams used for encryption of the speech. Here, we have explained how the random bit stream generated from an LFSR(with finite linear complexity) which is used for encryption of speech maintains a linear complexity in the course of encryption.We have described a method of finding exact positions of the silence zone and sound zone in a given encrypted speech cipher. And lastly, we have explained a method to break the speech cipher on the basis of the property that the random bit stream with finite linear complexity (LC) maintains constant LC for the whole course of encryption. Implementation : All the implementation was done in Linux Platform in C. Website : http://www.cse.iitk.ac.in/research/mtech2000/Y011121.html --------------------------------------------------------------------- B Tech Project: Fractional Fourier Transformation : Synthesis and Simulation ------------ ----------------------------------------------------- Abstract : Fresnel Transformation is used for analyzing a lens setup. Phase profile of the light beam can be changed by putting different phase only filters at Fractional Fourier Transform plane. In this project, a technique for computer simulation of Fractional FourierTransformation is reported. A single slit is taken as object. The filter is simulated to be placed at the half-order plane of a two lens system setup. We have derived different filters to get required changes in phase profile of the source light beam. Implementation : All required implementation was done in Windows system in C. ---------------------------------------------------------------------- Other experiences : ---------------------------------------------------------------------- 1. I was the Teaching Assistant in the course of Fundamentals of Computing of the instructor Prof. Pankaj Jalote, CSE, IITK in Sem-1,2000-2001 for taking assignment labs for C Programming Language in IIT Kanpur 2. I was the Teaching Assistant of the course of Advanced Algorithm course of the instructor Prof. Sanjeev Saxena, CSE, IITK in 2nd Sem, 2001-2002 in IITK Kanpur ----------------------------------------------------------------------- Scholastic Achievements: ------------------------------------------------------------------------- 1. Qualifying GATE, 2002 2. UGC Scholarship in 2000 in Calcutta University 3. ABSTA Scholarship in 1988 -------------------------------------------------------------------- Extra Curricular Activities: -------------------------------------------------------------------- 1. Developing the website for ACM International Collegiate Programming Contest(ICPC) 2002 for Asia Regional Site, IIT Kanpur. Address :http://www.cse.iitk.ac.in/users/acm/archive/acm2001/index.html 2. Developing a multimedia presenatation on IIT Kanpur to put in IIT KGP 50 years celebration in Science City , Calcutta on 5-6 of Jan, 2002 Report : http://www.iitk.ac.in/infocell/news/calcuttatrip -------------------------------------------------------------------------- Likings/Hobbies -------------------------------------------------------------------------- Jogging, Yoga and Exercise/ Potrait Painting. -------------------------------------------------------------------------