New Physics Seminar Topics

Physics Seminar Topics

Latest all new 2011 Physics Seminar Topics online for you

Topic List

1. Modern Steganography: Spread-Spectrum Modulation
2. The Playfair Cipher
3. A General-Purpose Public Key Cryptosystem
4. Cryptanalysis of Languages Other than English
5. Impartial Games and their Relation to Coding Theory
6. Row Reduced Echelon Form
7. Chaotic Cryptography
8. Implementation of the Data Encryption Algorithm in Matlab
9. Decryption using Vigenere Statistical Analysis Attacks
10. Image Watermarking and Steganography Theory and Simulations
11. Public Key Infrastructures
12. The Implementation of Public Key Cryptography in Microsoft Visual Basic
13. The use of Grobner Bases in Algebraic Coding Theory
14. Computer Security and the Hacker
15. The Hitch Hiker’s Guide to Quantum Cryptography
16. Factoring and Cryptography
17. Convolutional Codes
18. Enciphering, Diciphering and Frequency Analyses (With Extras)
19. Simulation of the Enigma Machine
20. ]A Digital Money System: Implementation and Analysis
21. The Vigenere Cipher
22. Creating Chaos From Order: Randomness in Cryptography
23. DES
24. A Discussion on the Implementation of the RSA Cryptosystem
25. Automatic Decryption of Substitution Ciphers
26. An Experiment with Steganography
27. Primality Testing
28. A Good Idea or a Difficult Implementation? A look at the IDEA Algorithm
29. Security of the RSA Cryptosystem
30. The History and Use of the ADFGVX Cipher
31. GSM: Mobile Communication Channel Coding
32. Secret Sharing Schemes: Visual Cryptography
33. The Enigma
34. The Advanced Encryption Standard
35. Quantum Cryptography
36. The Enigma Machine
37. Bar Code
38. Frequency Analysis on Polish Language in Comparison to English
39. Pretty Good Privacy (PGP) and Quantum Cryptography
40. An Insight into Quantum Key Distribution
41. The Enigma Machine
42. An Introduction to Quantum Cryptography and its Applications
43. Substitution and Permutation Networks (SPN)
44. An Introduction to Barcodes
45. The Vigenere Cipher
46. Quantum Cryptography
47. ElGamal and Associated Signature Structures
48. Gosubarstvennyi Standard (GOST)
49. Reed Soloman Product Code
50. An Investigation of Pseudo-Random Number Generators, with Applications in Cryptography
51. The Dish
52. The Enigma Machine and the Even Cryptographic Sins
53. 4c: An Improved Steganographic Encryption Program
54. Improving the use of the General Mixed Alphabet Cipher for use in Cryptography
55. Implementation of the Vigenere Cipher
56. Extensions of the Hill Cipher
57. The History of Codes and Ciphers
58. An Implementation of the Data Encryption Standard in Python
59. Steganography
60. Elliptic Curves and Their Applications in Cryptography
61. Data Compression
62. Primality Testing
63. Quantum Cryptography
64. Detecting Authentic Messages in a Network
65. Using extended alphabets to improve the security of general mixed alphabets
66. Cryptography and Security of ATM/EFTPOS
67. The Reductio Ad Adsurdium of Perfect Security with respect to Quantum Cryptography: A Philosophical argument focusing on the observer
68. Random and Rseudorandom Number Generators: Applications and Evaluation
69. Some Aspects of RSA
70. Ethical Aspects of Cryptography
71. Digital Watermarking and Cryptography
72. The German Enigma Machine
73. How Three Polish Mathematics Broke the Enigma Machine
74. An Investigation of Weighted Codes
75. Kerchoff’s bane: Information concealed
76. The solitaire cipher
77. Programming common ciphers
78. Teaching cryptography in the highschool classroom
79. The Playfair cipher – History, encryption using Matlab and security
80. Random number generation
81. Compact Discs
82. Breaking and protecting the Vigenere cipher
83. Dedicated Encryption box for Vigenre and Affine ciphers

84. The solution to the key distribution problem – public key cryptography and RSA
85. Random and pseudorandom Number Generators
86. Huffman coding vs Arithmetic coding and their use for coding and cryptography
87. The enigma cipher machine
88. The engima machine
89. The maximum scratch an audio compact disc can potentially cover by its coding system
90. The communication of ciphertext as music
91. Keystream ciphers

Leave a Reply

Your email address will not be published. Required fields are marked *

Security Code: