LATEST NEWS |
Ph.D
Principal
View DetailsM.Tech
Assistant Professor
View DetailsM.Sc, Ph.D
Assistant Professor
View DetailsMCA, NET (UGC)
SACT-1
View DetailsB.E, MS (USA), MBA (Canada)
Visiting Professor
History
Bangabasi College is one of the pioneering institutes to begin the B. Sc. Course in Computer Science in West Bengal. The Department of Computer Science was established in Bangabasi College in 1997 soon after Computer Science introduced as an additional subject in the +2 level of West Bengal Higher Secondary Course in 1995. Initially, General Course was started and then the Honours Course in Computer Science was introduced in the year 2003. In these years, the students have passed out with flying colours with a several students being awarded first class in each year. After graduating, the students either opt for higher education, get well placed in the industry or .
Mission
Vision
The Department of Computer Science envisions to become a leading department recognized for excellence in teaching, research and community engagement in the field of computer science. It aims to produce globally recognizable researchers, technocrats and entrepreneurs with sound ethics who meet industrial needs and societal expectations.
The Department of Computer Science conducted Add-on Courses on Cryptography in 2022 and 2023. The duration of each course was of 30 hours.
Introduction to Cryptography
Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and e-commerce. Cryptography can be traced back to ancient Egyptian hieroglyphics, but remains vital to securing communication and information in transit and preventing it from being read by untrusted parties. It uses algorithms and mathematical concepts to transform messages into difficult-to-decipher codes through techniques, like cryptographic keys and digital signature to protect data privacy, credit card transactions, email, and web browsing. Modern cryptography techniques include algorithms and ciphers that enable the encryption and decryption of information, such as 128-bit and 256-bit encryption keys. Modern ciphers, such as the Advanced Encryption Standard (AES) are considered virtually unbreakable.
Cryptography has a wide range of applications in modern-day communication, including:
Syllabus of the Course
UNIT I(Introduction to Cryptography and Block Ciphers) [10 Hours]
Introduction to security attacks - services and mechanism - introduction to cryptography - Conventional Encryption: Conventional encryption model - classical encryption techniques - substitution ciphers and transposition ciphers – cryptanalysis – steganography - stream and blockciphers - Modern Block Ciphers: Block ciphers principals - Shannon’s theory of confusion and diffusion - fiestal structure - data encryption standard(DES) - triple DES – AES.
Unit II (Confidentiality and Modular Arithmetic)[6 Hours]
Confidentiality using conventional encryption - key distribution - random number generation - Introduction to graph - ring and field - prime and relative prime numbers - modular arithmetic - Fermat’s and Euler’s theorem - primality testing - Euclid’s Algorithm - Chinese Remainder theorem - discrete algorithms.
Unit III (Public key cryptography and Authentication requirements) [6 Hours]
Principles of public key crypto systems - RSA algorithm - security of RSA - key management – Diffle-Hellman key exchange algorithm - Message Authentication and Hash Function: Authentication requirements - authentication functions - message authentication code - hash functions - security of hash functions and MACS.
Unit IV (Integrity checks and Authentication algorithms) [4 Hours]
MD5 message digest algorithm - Secure hash algorithm (SHA) Digital Signatures: Digital Signatures - authentication protocols - electronic mail security-pretty good privacy (PGP) - S/MIME.
Unit V (IP Security and Key Management) [2 Hours]
IP Security: Architecture - Authentication header - Encapsulating security payloads - combining security associations - key management.
Unit VI (Web and System Security) [2 Hours]
Web Security: Secure socket layer and transport layer security - secure electronic transaction (SET) - System Security: Intruders - Viruses and related threads - firewall design principals – trusted systems.
Links to access the Brochures:
https://drive.google.com/file/d/170hXrbSTzakrLf3ACcRR-6-g77-vVGAE/view?usp=drive_link
https://drive.google.com/file/d/1PbsZCn2H06VhGYQoXjr7LGltH8jytdXp/view?usp=drive_link
Links to access the Certificates:
https://drive.google.com/file/d/1okj4hM4-3qICbyNyeSkwufDfirpjofkH/view?usp=drive_link
https://drive.google.com/file/d/1KIpYehc0539A-wmGhZv5QGT1pmOXc8GJ/view?usp=drive_link
The Department of Computer Science takes immense pride in the achievements of its students, who have repeatedly excelled in curricular and co-curricular activities. Here are highlights of accomplishments of some of our students:
Sl No | Title | Result View |
---|
Year 2019:
Year 2020:
Year 2021:
Year 2022:
Year 2023:
Sl No | Title | Notice View |
---|
The Department of Computer Science provides a conducive environment for the students to learn, innovate and grow, preparing them for successful careers in both industry and research. It is well equipped with state-of-the-art facilities to support academic learning, hands-on experiments and students' projects. The key facilities include:
Laboratories: The department has two spacious, fully air-conditioned, Wi-Fi-enabled laboratories to support effective learning.
Classrooms:
Software and Tools:
Other Facilities:
Departmental E-mail Id: cs.bangabasi@gmail.com