You are on page 1of 2

xxxxxxxx

Career Objective:
Seeking a position where I can utilize my knowledge, abilities and Personal skills while being resourceful, innovative and flexible that offers professional growth along with the organization.

Educational Qualifications:
Course B.Tech.(ECE) Name of the Institution Year of Study 2003 - 2007 2001 - 2003 2000- 2001 Percentage 65.20 83.60 84.60

xxxxxxxx xxxxxxxx xxxxxxxx

Intermediate SSC

Technical skills:
Languages Operating Systems Packages : C , C++, VHDL, .Net : MS-DOS, WIN 98/2000/XP :Multisim.

Personal Skills:
Always owed with can-do spirit. Decision-making leadership, acceptance of responsibility and evidence of teamwork. Quick learner, resourceful, productive, and with good sense of humour. Comprehensive problem solving abilities. Hard worker while creative. Able to work independently, as a part of team, able to vaporize and grasp new things quickly.

Academic Honours and Extracurricular:


As someone with exceptional leadership qualities, nominated as Class Representative, a position that held responsibility in bridging the

communication gap between my mates. Stood college first in QUIZ which was conducted on behalf of college annual day XXX-2006. Active participant and volunteer in almost all aspects. Awarded as Best out going student from my school.

Project:
Title: Simulation of DES algorithm In VHDL. Company: NSIC,Hyderabad. Software : VHDL Team: four members. Description: The Project is aimed at sending data securely to the receiver using DES symmetric key cryptosystem which is used most popular form of cryptography.The private key algorithm is symmetric.It uses only one key for both encryption and decryption.The functions used in DES are portioning,iteration,permutation,shifting and selection. In the corporate network of NSIC, clients/servers need to interact with each other and at the same time maintain the confidentiality of data .Before transmission of the file the sender encrypts it using the DES algorithm and is then sent on the network. The public and private keys needed to encrypt and decrypt the data are preknown to the specific sender and the receiver .So that it could not be trapped by any unauthorized person.

Declaration:
I here by declare that the information furnished above is true to the best of my knowledge and belief.

Date: place: xxxxxxxx (xxxxxxxx)

You might also like