Admission Help Line

18900 00888

Admissions 2026 Open — Apply!

Faculty Dr Kakumani K C Deepthi

Dr Kakumani K C Deepthi

Assistant Professor

Department of Computer Science and Engineering

Contact Details

deepthi.k@srmap.edu.in

Office Location

C V Raman Block, Level 2, Cabin No: 9

Education

2022
National Institute of Technology, Tiruchirappalli
India
2010
MTech
Acharya Nagarjuna University, Guntur
India
2007
MBA
Sri Venkateswara University, Tirupati
India
2000
BTech (CSE)
Jawaharlal Nehru Technological University, Hyderabad
India

Experience

  • 2000-2003 ----Leturer ----Annamacharya Institute of Technology and Sciences, Rajampet, Kadapa
  • 2003-2007---- Assistant Professor ---Audisankara College of Engineering and Technology, Nellore
  • 2007-2015 ---- Associate Professor ----Priyadarshini college of Engineering and Technology, Nellore

Research Interest

  • Cryptanalysis for reduce round Salsa and ChaCha
  • Improved related-cipher attack on Salsa and ChaCha
  • Cube attack on stream cipher E0 and A5/1

Awards

No data available

Memberships

  • Life member in Cryptography Research Society of India (CRSI)
  • Life member in The Indian Society for Technical Education

Publications

  • New Hybrid Encryption Approach Combining RSA, Paillier and Goldwasser Micali Cryptosystems: Revisited

    Dr Kakumani K C Deepthi, Vivek Kothamasu., Sai Narasimha Chowdary Yalamanchili., Sanjana Maganti., Gopi Harshavardhan Jasti

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    In today’s digital world, cloud computing - where processing power and storage are provided via the internet has become essential. It lowers expenses and boosts productivity by giving businesses on demand access to scalable and adaptable IT resources. Data security in these contexts is of utmost importance due to the increasing dependence on cloud computing for tasks ranging from complicated calculations to data storage. In order to ensure data privacy in outsourced settings, homomorphic encryption is essential to cloud computing since it allows calculations on encrypted data without the need for decryption. This strategy is essential as companies depend more and more on cloud services for sensitive data. In this paper, we used homomorphic encryption to provide safe computations, enhancing security against assaults and tackling major security issues in contemporary cloud systems. For real-world applications that require robust cloud computing security and privacy, our solution is ideal.In order to provide strong security and effective homomorphic computations, in this paper, we presents a novel multi-hybrid cryptographic system that combines the RSA, Paillier, and Goldwasser-Micali encryption algorithms. Our system leverages the strengths of each algorithm while effectively addressing their unique drawbacks. RSA offers robust public key encryption for secure communications, while Paillier’s additive homomorphism and Goldwasser-Micali’s XOR operations enable secure data processing within the proposed system. This combination ensures that sensitive data can be encrypted, shared, and processed without compromising privacy, making our solution both secure and efficient for various applications. We outline the encryption and decryption procedures along with the architecture and implementation of hybrid system. This solution is well-suited for realworld applications in cloud environments, as it enhances defense against potential attacks and simplifies secure computations on encrypted data. By integrating these features, we ensure robust security while maintaining the efficiency needed for practical use.
  • Fake Product Detection using Blockchain

    Dr Kakumani K C Deepthi, Dr Prasanthi Boyapati, Srinivasa Rao Tottempudi., Gude Sujatha

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    Counterfeit products continue to pose a significant challenge to consumer safety and brand integrity worldwide. Traditional counterfeit detection techniques frequently lack the openness and effectiveness needed to properly address this widespread problem. In order to improve the identification of counterfeit goods, this work presents a novel technique that combines blockchain technology with barcode systems. Every product is given a unique blockchain barcode that contains vital information including its origin, manufacturing specifications, and supply chain history, thanks to the utilization of blockchain’s immutable ledger. Verification procedures are automated by smart contracts, guaranteeing the accuracy of product data and enabling real-time tracking of goods movements. By establishing a decentralized network, stakeholders across the supply chain, including manufacturers, distributors, retailers, and consumers, can securely access and authenticate product information. Customers are better equipped to make educated purchases because to this transparent and traceable system, which also helps to build customer confidence in the legitimacy of the goods. This work presents a thorough implementation technique for blockchain barcode technology, demonstrating how it might transform activities related to detecting counterfeit goods. Through empirical studies and case analysis, the effectiveness and practicality of the proposed solution are demonstrated, offering a promising avenue for bolstering consumer confidence and safeguarding against the proliferation of fake products in the global marketplace.

Patents

Projects

Scholars

Interests

  • Blockchain
  • Cryptography
  • LOT
  • Networking

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Education
2000
BTech (CSE)
Jawaharlal Nehru Technological University, Hyderabad
India
2007
MBA
Sri Venkateswara University, Tirupati
India
2010
MTech
Acharya Nagarjuna University, Guntur
India
2022
National Institute of Technology, Tiruchirappalli
India
Experience
  • 2000-2003 ----Leturer ----Annamacharya Institute of Technology and Sciences, Rajampet, Kadapa
  • 2003-2007---- Assistant Professor ---Audisankara College of Engineering and Technology, Nellore
  • 2007-2015 ---- Associate Professor ----Priyadarshini college of Engineering and Technology, Nellore
Research Interests
  • Cryptanalysis for reduce round Salsa and ChaCha
  • Improved related-cipher attack on Salsa and ChaCha
  • Cube attack on stream cipher E0 and A5/1
Awards & Fellowships
No data available
Memberships
  • Life member in Cryptography Research Society of India (CRSI)
  • Life member in The Indian Society for Technical Education
Publications
  • New Hybrid Encryption Approach Combining RSA, Paillier and Goldwasser Micali Cryptosystems: Revisited

    Dr Kakumani K C Deepthi, Vivek Kothamasu., Sai Narasimha Chowdary Yalamanchili., Sanjana Maganti., Gopi Harshavardhan Jasti

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    In today’s digital world, cloud computing - where processing power and storage are provided via the internet has become essential. It lowers expenses and boosts productivity by giving businesses on demand access to scalable and adaptable IT resources. Data security in these contexts is of utmost importance due to the increasing dependence on cloud computing for tasks ranging from complicated calculations to data storage. In order to ensure data privacy in outsourced settings, homomorphic encryption is essential to cloud computing since it allows calculations on encrypted data without the need for decryption. This strategy is essential as companies depend more and more on cloud services for sensitive data. In this paper, we used homomorphic encryption to provide safe computations, enhancing security against assaults and tackling major security issues in contemporary cloud systems. For real-world applications that require robust cloud computing security and privacy, our solution is ideal.In order to provide strong security and effective homomorphic computations, in this paper, we presents a novel multi-hybrid cryptographic system that combines the RSA, Paillier, and Goldwasser-Micali encryption algorithms. Our system leverages the strengths of each algorithm while effectively addressing their unique drawbacks. RSA offers robust public key encryption for secure communications, while Paillier’s additive homomorphism and Goldwasser-Micali’s XOR operations enable secure data processing within the proposed system. This combination ensures that sensitive data can be encrypted, shared, and processed without compromising privacy, making our solution both secure and efficient for various applications. We outline the encryption and decryption procedures along with the architecture and implementation of hybrid system. This solution is well-suited for realworld applications in cloud environments, as it enhances defense against potential attacks and simplifies secure computations on encrypted data. By integrating these features, we ensure robust security while maintaining the efficiency needed for practical use.
  • Fake Product Detection using Blockchain

    Dr Kakumani K C Deepthi, Dr Prasanthi Boyapati, Srinivasa Rao Tottempudi., Gude Sujatha

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    Counterfeit products continue to pose a significant challenge to consumer safety and brand integrity worldwide. Traditional counterfeit detection techniques frequently lack the openness and effectiveness needed to properly address this widespread problem. In order to improve the identification of counterfeit goods, this work presents a novel technique that combines blockchain technology with barcode systems. Every product is given a unique blockchain barcode that contains vital information including its origin, manufacturing specifications, and supply chain history, thanks to the utilization of blockchain’s immutable ledger. Verification procedures are automated by smart contracts, guaranteeing the accuracy of product data and enabling real-time tracking of goods movements. By establishing a decentralized network, stakeholders across the supply chain, including manufacturers, distributors, retailers, and consumers, can securely access and authenticate product information. Customers are better equipped to make educated purchases because to this transparent and traceable system, which also helps to build customer confidence in the legitimacy of the goods. This work presents a thorough implementation technique for blockchain barcode technology, demonstrating how it might transform activities related to detecting counterfeit goods. Through empirical studies and case analysis, the effectiveness and practicality of the proposed solution are demonstrated, offering a promising avenue for bolstering consumer confidence and safeguarding against the proliferation of fake products in the global marketplace.
Contact Details

deepthi.k@srmap.edu.in

Scholars
Interests

  • Blockchain
  • Cryptography
  • LOT
  • Networking

Education
2000
BTech (CSE)
Jawaharlal Nehru Technological University, Hyderabad
India
2007
MBA
Sri Venkateswara University, Tirupati
India
2010
MTech
Acharya Nagarjuna University, Guntur
India
2022
National Institute of Technology, Tiruchirappalli
India
Experience
  • 2000-2003 ----Leturer ----Annamacharya Institute of Technology and Sciences, Rajampet, Kadapa
  • 2003-2007---- Assistant Professor ---Audisankara College of Engineering and Technology, Nellore
  • 2007-2015 ---- Associate Professor ----Priyadarshini college of Engineering and Technology, Nellore
Research Interests
  • Cryptanalysis for reduce round Salsa and ChaCha
  • Improved related-cipher attack on Salsa and ChaCha
  • Cube attack on stream cipher E0 and A5/1
Awards & Fellowships
No data available
Memberships
  • Life member in Cryptography Research Society of India (CRSI)
  • Life member in The Indian Society for Technical Education
Publications
  • New Hybrid Encryption Approach Combining RSA, Paillier and Goldwasser Micali Cryptosystems: Revisited

    Dr Kakumani K C Deepthi, Vivek Kothamasu., Sai Narasimha Chowdary Yalamanchili., Sanjana Maganti., Gopi Harshavardhan Jasti

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    In today’s digital world, cloud computing - where processing power and storage are provided via the internet has become essential. It lowers expenses and boosts productivity by giving businesses on demand access to scalable and adaptable IT resources. Data security in these contexts is of utmost importance due to the increasing dependence on cloud computing for tasks ranging from complicated calculations to data storage. In order to ensure data privacy in outsourced settings, homomorphic encryption is essential to cloud computing since it allows calculations on encrypted data without the need for decryption. This strategy is essential as companies depend more and more on cloud services for sensitive data. In this paper, we used homomorphic encryption to provide safe computations, enhancing security against assaults and tackling major security issues in contemporary cloud systems. For real-world applications that require robust cloud computing security and privacy, our solution is ideal.In order to provide strong security and effective homomorphic computations, in this paper, we presents a novel multi-hybrid cryptographic system that combines the RSA, Paillier, and Goldwasser-Micali encryption algorithms. Our system leverages the strengths of each algorithm while effectively addressing their unique drawbacks. RSA offers robust public key encryption for secure communications, while Paillier’s additive homomorphism and Goldwasser-Micali’s XOR operations enable secure data processing within the proposed system. This combination ensures that sensitive data can be encrypted, shared, and processed without compromising privacy, making our solution both secure and efficient for various applications. We outline the encryption and decryption procedures along with the architecture and implementation of hybrid system. This solution is well-suited for realworld applications in cloud environments, as it enhances defense against potential attacks and simplifies secure computations on encrypted data. By integrating these features, we ensure robust security while maintaining the efficiency needed for practical use.
  • Fake Product Detection using Blockchain

    Dr Kakumani K C Deepthi, Dr Prasanthi Boyapati, Srinivasa Rao Tottempudi., Gude Sujatha

    Source Title: Algorithms in Advanced Artificial Intelligence, DOI Link

    View abstract ⏷

    Counterfeit products continue to pose a significant challenge to consumer safety and brand integrity worldwide. Traditional counterfeit detection techniques frequently lack the openness and effectiveness needed to properly address this widespread problem. In order to improve the identification of counterfeit goods, this work presents a novel technique that combines blockchain technology with barcode systems. Every product is given a unique blockchain barcode that contains vital information including its origin, manufacturing specifications, and supply chain history, thanks to the utilization of blockchain’s immutable ledger. Verification procedures are automated by smart contracts, guaranteeing the accuracy of product data and enabling real-time tracking of goods movements. By establishing a decentralized network, stakeholders across the supply chain, including manufacturers, distributors, retailers, and consumers, can securely access and authenticate product information. Customers are better equipped to make educated purchases because to this transparent and traceable system, which also helps to build customer confidence in the legitimacy of the goods. This work presents a thorough implementation technique for blockchain barcode technology, demonstrating how it might transform activities related to detecting counterfeit goods. Through empirical studies and case analysis, the effectiveness and practicality of the proposed solution are demonstrated, offering a promising avenue for bolstering consumer confidence and safeguarding against the proliferation of fake products in the global marketplace.
Contact Details

deepthi.k@srmap.edu.in

Scholars