Anda di halaman 1dari 2

xxxxxxxx

Career Objective:

Seeking a position where I can utilize my knowledge, abilities and


Personal skills while being resourceful, innovative and flexible that offers professional
growth along with the organization.

Educational Qualifications:

Course Name of the Institution Year of Study Percentage


B.Tech.(ECE) xxxxxxxx
2003 - 2007 65.20

Intermediate xxxxxxxx 2001 - 2003 83.60

SSC xxxxxxxx 2000- 2001 84.60

Technical skills:

Languages : C , C++, VHDL, .Net


Operating Systems : MS-DOS, WIN 98/2000/XP
Packages :Multisim.

Personal Skills:

 Always owed with “can-do spirit”.


 Decision-making leadership, acceptance of responsibility and evidence of team-
work.
 Quick learner, resourceful, productive, and with good sense of humour.
 Comprehensive problem solving abilities.
 Hard worker while creative.
 Able to work independently, as a part of team, able to vaporize and grasp new
things quickly.

Academic Honours and Extracurricular:

 As someone with exceptional leadership qualities, nominated as


Class Representative, a position that held responsibility in bridging the
communication gap between my mates.
 Stood college first in QUIZ which was conducted on behalf of college annual day
XXX-2006.
 Active participant and volunteer in almost all aspects.
 Awarded as Best out going student from my school.

Project:

Title: Simulation of DES algorithm In VHDL.


Company: NSIC,Hyderabad.
Software : VHDL
Team: four members.

Description:
The Project is aimed at sending data securely to the receiver
using DES symmetric key cryptosystem which is used most popular form of
cryptography.The private key algorithm is symmetric.It uses only one key for both
encryption and decryption.The functions used in DES are
portioning,iteration,permutation,shifting and selection.

In the corporate network of NSIC, clients/servers need to


interact with each other and at the same time maintain the confidentiality of data .Before
transmission of the file the sender encrypts it using the DES algorithm and is then sent on
the network. The public and private keys needed to encrypt and decrypt the data are pre-
known to the specific sender and the receiver .So that it could not be trapped by any
unauthorized person.

Declaration:

I here by declare that the information furnished above is true to the best of my
knowledge and belief.

Date:
place: xxxxxxxx
(xxxxxxxx)