- 👋 Hi, I’m @ardraayyappath
- 👀 I’m interested in computer networks and security, and am currently a masters student at Northeastern University, Boston
- 💞️ I’m looking to collaborate on any projects related to network security, penetration testing and cryptography.
- 📫 Feel free to reach me at ayyappath.a@northeastern.edu
-
Northeastern University
- Boston
Pinned Loading
-
Reliable-Transport-Protocols
Reliable-Transport-Protocols PublicThe three reliable data transport protocols: Alternating-Bit (ABT), Go-Back-N (GBN), and Selective-Repeat (SR), have been implemented in the given simulator, and the performance of the three has be…
C++
-
AES-and-RSA-for-secure-network-communications
AES-and-RSA-for-secure-network-communications PublicUsed AES and RSA for secure network communications and analysed the performance of the openSSL implementations of both algorithms. Used socket programming in C for communication between the server…
C 1
-
Correlation-Power-Analysis-Attack
Correlation-Power-Analysis-Attack PublicImplemented a correlation power analysis (CPA) attack and recovered a full round key used in an AES encryption process, with a set of power traces of the 128-bit AES core running on an FPGA board a…
Python 1
-
Acoustic-Emanation-Attack
Acoustic-Emanation-Attack PublicAn attack to steal the secret from an audio recording of keyboard typings
Python 1
-
Virus-in-C-to-infect-ELF-files
Virus-in-C-to-infect-ELF-files PublicSimple virus in C was designed to infect ELF files and display a chosen message.
C
-
Socket-Programming-with-Python
Socket-Programming-with-Python PublicClient side of a network application is designed according to the client-server application architecture. The server is already implemented and running on a remote machine. After an initial greetin…
Python
If the problem persists, check the GitHub status page or contact support.