Information Technology Act

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The Information Technology (IT) Rules, 2021

    The IT Rules 2021 seek to address cyber security concerns of the citizens without infringing on their privacy and personal liberties, while maintaining digital sovereignty at the same time.

    June 04, 2021

    The Road to 5G: Technology, Politics And Beyond

    Monograph No. 65

    This monograph examines the key technologies behind 5G, the requirements of infrastructure and spectrum, and the emerging landscape with the rise of Chinese telecommunication equipment manufactures. It delves into China’s rise as a key technology provider in the telecommunications sector, and a prime contributor to standards development.

    2019

    Soumyadipta Majumder asked: What is the difference between Data Encryption Standard (DES) & Advanced Encryption Standard (AES)?

    Arul R. replies: Encryption standards are used to secure data and communication. With advancement in computational processing power, encryption standards too evolved, replacing the old with more effective new ones. The Data Encryption Standard (DES) was an excellent encryption standard for nearly two decades, from 1970s to 1990s.

    Soumyadipta Majumder asked: What are the different modes of encryption?

    Arul R. replies: Encryption is a way of scrambling the data or message thereby securing the data from unintended recipients. Decryption is the way of retrieving the data that is encrypted.

    There are two basic modes of encryption:

    Relevance of Cloud Computing for Defence

    Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing.

    April 2014

    Top