PhD (Computer Science) MCA BSc (Mathematics)
Professor and Head of MCA, Dr. B. C. Roy Engineering College, Durgapur-713206
Mrs. Piali Dutta, Master Spandanil Dutta, Mrs. Lekha Dutta
Wish to All Their Well-Wishers

I am truly honoured to have been enlisted as one of the Keynote Speakers in the 1st International Conference on E-Business and Digital Information System to be held in Kathmandu during February 15-16 in 2011. The list, currently consisting of two Keynote Speakers, also includes Dr. Subarna K. Das, an Associate Professor of Department of Library and Information Science in Jadavpur University. I shall eagerly be looking forward to address to the learned audience in that conference.


Piali, my spouse, faced another episode of high heartbeat in the evening on July 5 last. Ultimately, I had to rush driving my own car with her to the Emergency Section of the Mission Hospital, where she recovered from that fatigue state and came back to residence after a couple of hours.
In an attempt to have her permanent recovery from such irregular heartbeat, cardiologists of the Mission Hospital decided to have the Electrophysiological Study (EPS) and subsequently, if needed, Radiofrequency Ablation (RFA) on her, which is likely to be held in 3rd or 4th week of forthcoming August.
Let us pray to the almighty to have a permanent recovery of my beloved spouse, who faces such a fatigue state, may be, only once in a year but probably is much more fit than me in rest 364 days in the year. Apart from the rest, she does require your best of wishes.
Let us dream of her everlasting recovery.
It is my pleasure to share with all of you that based on my performance as Associate Professor in Dr. B. C. Roy Engineering College, the authority of the college has promoted me to Professor w.e.f. 01-04-2010. I do feel that such an inspirational promotion by the age of 37 will encourage me to do even better with co-operation from all my colleagues and students.
Around a couple of weeks ago, for a very few days, there was an article entitled Shameless existing in my blog, which is now not available in the blog. This is for information for those who did not go through it that it was a mesmerizing real story of NIT-Durgapur.
If you are interested to receive a copy of that article, feel free to mail me at saurabhdutta06061973@gmail.com. On receiving such a mail, a softcopy of the same will be forwarded to your mailbox.
One fascinating way of ensuring security of electronic data is to embed it within an image and to transmit the image to desired recipient. An image being a collection of pixels and even a single pixel being a collection of binary digits, replacement of some less significant binary digits by binary digits corresponding to aforesaid data does not practically make a change to that image, when viewed in naked eyes. Therefore, even the existence of secret data within that image is hard to realize. The formulation of effective strategies to implement this concept, technically termed as Steganography, has been a burning area of research for last several years. Over the years, encryption has been a means of protecting electronic data. Prior to its transmission, data is encoded using an encryption algorithm. Apart from the original data, a value, termed as key, is fed into the encryption program to encode the data to generate the ready-to-be-transmitted encrypted data. In receiving end, the encrypted data, along with a key, is fed into the decryption program to decode the encrypted data. Thus for a communication of data over a transmission channel, both the ends of the channel can be equipped with encryption devices, one for performing encryption and the other for doing the reverse. Incidentally, keys used in both ends of transmission channel may be identical or different. In former case, termed as private-key encryption policy, the key-sharing requires a lot of care to maintain the privacy. The headache of key-sharing is avoided in public-key encryption policy by using a pair of keys, the public key of receiver during encryption and the private key of receiver during decryption. Authentication is closely associated with security. One can send an authenticated or digitally signed electronic message by encrypting it with his own private key, which, in receiving end, can only be decrypted through the corresponding public-key. Developing public-key encryption policy with proven efficiency is one striking challenge for researchers. However, even a private-key policy with a reasonably large key-space is arguably compatible with a public-key policy. As per an appealing observation, even a fast processor with capability of decrypting 1000000 decryptions in 1 µs requires around 5000000000000000000 years to successfully break a 128-bit private-key used during a common implementation of Rijndael, a proposed private-key policy selected by NIST (US-based National Institute of Standards and Technology) as an AES (Advanced Encryption Standard) algorithm. If an image with encrypted message embedded into it is digitally signed, it becomes fairly non-vulnerable against possible attacks.
(From the draft to write invited article for a technical newsletter)
Very recently, I completed preparing a PPT entitled AN APPROACH TOWARDS DEVELOPMENT OF 252-BIT INTEGRATED ENCRYPTION SYSTEM (IES) deliverable tentatively in 3 hours.
Through its first two phases, I focus on approach of design and development of some of my own ciphers, which I developed during my work for PhD. The proposed 252-bit IES is ultimately presented in its third and final phase. A presentation like this might be of some help for upcoming researchers in areas surrounding Cryptology.
I may think of delivering this presentation, if I get an opportunity to share it with a gathering of learned scholars.
PROFESSIONAL ATTACHMENT
Professor and Head of MCA
Dr. B. C. Roy Engineering College
Durgapur-713206, WB, INDIA
MEMBERSHIP
Senior Member, IACSIT (http://www.iacsit.org/)
Editorial Board Member, IJIST (http://airccse.org/journal/IS/)
Member of Reviewer Board, IJACSA (http://thesai.org/)
Editorial Board Member, IJISMRD (http://tjprc.org/journals.php)
Editorial Board Member, IJMCAR (http://tjprc.org/journals.php)
Member of Reviewer Team, IJERA (http://ijera.com/)
Member of Reviewer Board, IJCSS (http://www.cscjournals.org/csc/home.php)
Editorial Associate Member, IJMER (http://www.ijmer.com/)
Member, IJCSI (http://www.ijcsi.org/) Reviewers Committee
Life Member, CRSI (http://crsind.com)
Member, IAENG (http://www.iaeng.org/)
PERMANENT RESIDENCE
E-03, Madhu Mamata Apartment
Uttarayan, Sagarbhanga
Durgapur-713211, WB, INDIA
CONTACT INFORMATION
Mail: saurabh.dutta@bcrec.ac.in
Cell: +91-9433411450