Sie sind auf Seite 1von 3

The first time I saw a computer, at the age of 14 years, it fascinated me how a box doing magics

when electricity is passed. I was introduced to a computer in my school. We were taught how
input devices, such as keyboard and output devices like monitor are controlled by a central
processing unit (CPU) which is also termed as the brain of the computer. This motivated me to
select computer science as one of the main subjects for my undergraduate studies at Delhi
University.

In my undergraduate studies, I went through a basic understanding of computers. I studied


computer architecture, which made me informed how the electrical circuits for the computer are
designed. We were taught how an algorithm is designed to solve a problem. The course also
included the introduction of database management, which is one of the most important areas in
computer science. The introduction of programming languages like C, C++, Java and python
helped me in designing my solutions to common problems.

My passion for computers leads me to opt for MSc in computer science at South Asian
University, New Delhi. Here, I was introduced to entirely new areas in the field. Firstly, the
course consisted of a mathematical foundation for computer science as these two fields are
closely related to each other. The advancement in mathematics complements innovation in
computer science. This leads to study subjects such as machine learning, cryptography,
advanced algorithms, computer networks, network programming and others.

However, the field of networks and machine learning intrigues me a lot. I came to know about
how we train our machine in a way that it can predict or determine a solution in future by itself.
Here we treat the machine as a naive baby who kept on learning and then apply that learning in
future life. Machine learning made me come closer to the amazing aspects of the magic box I
had always been fascinated about.

Then, Security and transmission of confidential information have always been a major concern
for all kinds of users because of this reason, I opted for network programming and computer
networks where I learned about network layers functioning. On a similar ground, for my master’s
dissertation, I went for the field of steganography which comes under the umbrella of security.
Currently, I am working upon hiding sensitive information in audio files and makes it “hard” for
anyone other than the intended recipient to retrieve the hidden information. As of now, I have
implemented some of the techniques such as embedding text into a least significant bit and
embedding text through bitrate modulation. And now, working on developing a technique to
embed data in audio, image or text form into a cover audio file. Apart from this, I have also done
projects in cryptography, machine learning and network programming. For a cryptography
project, I used AES-192 CBC mode encryption algorithm for the secure transmission of
information over a network.

My plan for doctoral study is to first understand the architecture of cryptographic algorithms,
which acts as a base for solutions like Public Key Infrastructure (PKI), Secure Socket Layer
(SSL), Virtual Private Network (VPN) and blockchain technology. A breach in PKI infrastructure
or SSL can bring the stored or in-traverse data vulnerable. Similarly, VPN which is mostly used
by corporations around the world to make a close group of physically distinct sites. Blockchain is
a new entry in the field of ICT, but has potential to become a giant player.

Blockchain technology has the potential to revolutionize different aspects of human life by
transforming the application from centralized to decentralized nature. The current day
application scenario is a centralized server architecture, where a group controls the flow of
information and has decision making powers. This creates an imbalance among the society with
a single point of failure, and chances of tampering of data by malicious users. Furthermore, in
today's world, the data is being treated as money, and the control resides with only a few people
and not with the generators of data, the problem can be catastrophical. Blockchain technology,
with its feature of decentralized distributed ledger, shared among all the peers, can drastically
change our perspective toward different applications. The blockchain gives power to users to
control the access of their data.

The security of blockchain by far depends upon the scale of resources required hamper the
services provided by it. In order to tamper a record, the amount of resources required exceed
the gains. The idea generally works well in case of popular monetary blockchain. However, the
changing nature of blockchain and its adaptability in various application calls for attack Cost
Analysis and measures to ensure increase in difficulty of causing attacks.

There can be many types of attacks such as attempts to alter records of already mined blocks,
denial of service by broadcasting garbage transactions which in turn require computational
resources to verify their validity and also storage space in de centralised networks. I would like
to work on these lines to offer better and sustainable solutions using blockchain.

My knowledge is not vast; it is only at the elementary level and I am determined to widen my
horizon by joining a PhD program at your esteemed institution. I am convinced that I should
pursue a career in research and teaching. It would be immensely gratifying for me to be able to
contribute something to the understanding of a subject that has given me so much pleasure and
joy.