DevConf.IN 2025

Dr. Uma Pujeri

Dr Uma R Pujeri was born in Sangli, India, in 1981. She has received M.Tech degree from PSG Tech college of Engineering Coimbatore in 2008. She has received doctorate degree from Anna University Chennai in May 2017. Her research area is computer network congestion control algorithm. She has worked as a Assistant
Professor in Aditya College of Engineering Coimbatore for six years. Currently she is working as an Associate Professor in Dr. Vishwanath Karad MIT World Peace University. She has a total sixteen years of teaching experience. She is a Life Member of the Indian Society for Technical Education (ISTE). She has total 40 publications in International journals. She has a total 10 Design Patents National and International. Total 8 Copyright granted. Two Indian Patents published and One International Patent Granted. Her PhD thesis is available online on Shodhganga https://shodhganga.inflibnet.ac.in/handle/10603/196148?mode=full . She has completed her Postdoctoral from Srinivas University College of Engineering & Technology. Her Postdoctoral Thesis Title was "Post Quantum Cryptography Using Lattice" and her Postdoctoral registration number was 20SUPDR009


Company or affiliation

Dr. Vishwanath Karad MIT World Peace University

Job title

Associate Professor


Session

02-28
16:00
35min
Encryption Techniques From Traditional To Modern Encryption Technique
Dr. Uma Pujeri

Encryption has played a vital role in safeguarding communication throughout history, adapting to the growing complexity of threats and the ever-increasing need for data privacy in modern times. Early methods, such as the Caesar cipher and substitution techniques, introduced fundamental ideas for securing information. While these traditional approaches were innovative for their era, they were limited in resilience, often susceptible to frequency analysis and basic decryption attempts.
With the advent of modern computing, encryption methods advanced significantly, in The digital age brought revolutionary advancements in encryption, including the development of symmetric key algorithms like the Data Encryption Standard (DES). Introduced in the 1970s, DES became a widely adopted standard for data protection, relying on a single shared key for both encryption and decryption. While DES marked a significant milestone, its 56-bit key length eventually proved vulnerable to brute force attacks, prompting the adoption of more robust successors like Triple DES (3DES) and the Advanced Encryption Standard (AES). introducing sophisticated algorithms capable of withstanding more complex attacks. AES algorithm is optimized for speed and efficiency, making them ideal for protecting large volumes of data. Meanwhile, asymmetric encryption systems such as RSA and Diffie Hellman key exchange facilitate secure communication and digital verification through their reliance on intricate mathematical operations.
Recent developments have pushed the boundaries further with quantum-resistant encryption to counteract the looming risks posed by quantum computing and homomorphic encryption, which enables encrypted data to be processed without exposing its contents. These breakthroughs address critical challenges in domains such as cloud computing, financial systems, and data-driven industries. This talk traces the trajectory of encryption technologies from their traditional origins to contemporary advancements, exploring their impact, limitations, and potential to secure future communications in a rapidly evolving technological landscape.
Also talk will also discuss my own algorithm “Symmetric Encryption Algorithm using ASCII Values” written and its implementation.

Security and Sustainable Computing
Shivneri Room (Chanakya Building / School of Business)