Skip to content
View ardraayyappath's full-sized avatar
  • Northeastern University
  • Boston
Block or Report

Block or report ardraayyappath

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ardraayyappath/README.md
  • 👋 Hi, I’m @ardraayyappath
  • 👀 I’m interested in computer networks and security, and am currently a masters student at Northeastern University, Boston
  • 💞️ I’m looking to collaborate on any projects related to network security, penetration testing and cryptography.
  • 📫 Feel free to reach me at ayyappath.a@northeastern.edu

Pinned

  1. Reliable-Transport-Protocols Reliable-Transport-Protocols Public

    The three reliable data transport protocols: Alternating-Bit (ABT), Go-Back-N (GBN), and Selective-Repeat (SR), have been implemented in the given simulator, and the performance of the three has be…

    C++

  2. AES-and-RSA-for-secure-network-communications AES-and-RSA-for-secure-network-communications Public

    Used AES and RSA for secure network communications and analysed the performance of the openSSL implementations of both algorithms. Used socket programming in C for communication between the server…

    C 1

  3. Correlation-Power-Analysis-Attack Correlation-Power-Analysis-Attack Public

    Implemented a correlation power analysis (CPA) attack and recovered a full round key used in an AES encryption process, with a set of power traces of the 128-bit AES core running on an FPGA board a…

    Python 1

  4. Acoustic-Emanation-Attack Acoustic-Emanation-Attack Public

    An attack to steal the secret from an audio recording of keyboard typings

    Python 1

  5. Virus-in-C-to-infect-ELF-files Virus-in-C-to-infect-ELF-files Public

    Simple virus in C was designed to infect ELF files and display a chosen message.

    C

  6. Socket-Programming-with-Python Socket-Programming-with-Python Public

    Client side of a network application is designed according to the client-server application architecture. The server is already implemented and running on a remote machine. After an initial greetin…

    Python