Physics Seminar Topics

Latest all new 2011 Physics Seminar Topics online for you

Topic List

1. Modern Steganography: Spread-Spectrum Modulation

2. The Playfair Cipher

3. A General-Purpose Public Key Cryptosystem

4. Cryptanalysis of Languages Other than English

5. Impartial Games and their Relation to Coding Theory

6. Row Reduced Echelon Form

7. Chaotic Cryptography

8. Implementation of the Data Encryption Algorithm in Matlab

9. Decryption using Vigenere Statistical Analysis Attacks

10. Image Watermarking and Steganography Theory and Simulations

11. Public Key Infrastructures

12. The Implementation of Public Key Cryptography in Microsoft Visual Basic

13. The use of Grobner Bases in Algebraic Coding Theory

14. Computer Security and the Hacker

15. The Hitch Hiker’s Guide to Quantum Cryptography

16. Factoring and Cryptography

17. Convolutional Codes

18. Enciphering, Diciphering and Frequency Analyses (With Extras)

19. Simulation of the Enigma Machine

20. ]A Digital Money System: Implementation and Analysis

21. The Vigenere Cipher

22. Creating Chaos From Order: Randomness in Cryptography

23. DES

24. A Discussion on the Implementation of the RSA Cryptosystem

25. Automatic Decryption of Substitution Ciphers

26. An Experiment with Steganography

27. Primality Testing

28. A Good Idea or a Difficult Implementation? A look at the IDEA Algorithm

29. Security of the RSA Cryptosystem

30. The History and Use of the ADFGVX Cipher

31. GSM: Mobile Communication Channel Coding

32. Secret Sharing Schemes: Visual Cryptography

33. The Enigma

34. The Advanced Encryption Standard

35. Quantum Cryptography

36. The Enigma Machine

37. Bar Code

38. Frequency Analysis on Polish Language in Comparison to English

39. Pretty Good Privacy (PGP) and Quantum Cryptography

40. An Insight into Quantum Key Distribution

41. The Enigma Machine

42. An Introduction to Quantum Cryptography and its Applications

43. Substitution and Permutation Networks (SPN)

44. An Introduction to Barcodes

45. The Vigenere Cipher

46. Quantum Cryptography

47. ElGamal and Associated Signature Structures

48. Gosubarstvennyi Standard (GOST)

49. Reed Soloman Product Code

50. An Investigation of Pseudo-Random Number Generators, with Applications in Cryptography

51. The Dish

52. The Enigma Machine and the Even Cryptographic Sins

53. 4c: An Improved Steganographic Encryption Program

54. Improving the use of the General Mixed Alphabet Cipher for use in Cryptography

55. Implementation of the Vigenere Cipher

56. Extensions of the Hill Cipher

57. The History of Codes and Ciphers

58. An Implementation of the Data Encryption Standard in Python

59. Steganography

60. Elliptic Curves and Their Applications in Cryptography

61. Data Compression

62. Primality Testing

63. Quantum Cryptography

64. Detecting Authentic Messages in a Network

65. Using extended alphabets to improve the security of general mixed alphabets

66. Cryptography and Security of ATM/EFTPOS

67. The Reductio Ad Adsurdium of Perfect Security with respect to Quantum Cryptography: A Philosophical argument focusing on the observer

68. Random and Rseudorandom Number Generators: Applications and Evaluation

69. Some Aspects of RSA

70. Ethical Aspects of Cryptography

71. Digital Watermarking and Cryptography

72. The German Enigma Machine

73. How Three Polish Mathematics Broke the Enigma Machine

74. An Investigation of Weighted Codes

75. Kerchoff’s bane: Information concealed

76. The solitaire cipher

77. Programming common ciphers

78. Teaching cryptography in the highschool classroom

79. The Playfair cipher – History, encryption using Matlab and security

80. Random number generation

81. Compact Discs

82. Breaking and protecting the Vigenere cipher

83. Dedicated Encryption box for Vigenre and Affine ciphers

84. The solution to the key distribution problem – public key cryptography and RSA

85. Random and pseudorandom Number Generators

86. Huffman coding vs Arithmetic coding and their use for coding and cryptography

87. The enigma cipher machine

88. The engima machine

89. The maximum scratch an audio compact disc can potentially cover by its coding system

90. The communication of ciphertext as music

91. Keystream ciphers

i just can say that this is totally new for me, so thanks…

regards,

sally

Sometimes it is not working as you want… same wood here.

regards,

Sally