Prof. (Dr.) Adarsh Kumar

Prof. (Dr.) Adarsh Kumar

Professor

Profile Summary

Prof. (Dr.) Adarsh Kumar is a distinguished scholar with a Ph.D. in Computer Science and Engineering from Jaypee Institute of Information Technology, Noida, Uttar Pradesh, India, specializing in lightweight cryptographic primitives and protocols for mobile ad-hoc networks. His research focuses on the design, simulation and analysis of lightweight cryptographic primitives and protocols for resource-constrained networks. With this research direction, Dr. Kumar is dedicated to integrating lightweight security solutions for futuristic or next-generation networks and associated devices.

Work Experience

Research Interests:  Dr. Kumar is presently focusing on the design, development and analysis of lightweight cryptographic solutions for secure drone-to-drone-based communications in advanced futuristic networks. His work explored the multi drone movement and collision avoidance strategies for medium to large scale implementation, with a particular emphasis for security and performance concerns in next-generation networks. He is deeply interested in software defined networking integrated solutions for efficient control, monitoring and analysis of futuristic networks including vulnerability and attack analysis, quality of service analysis, resource utilization and allocation, and formal verification. Looking ahead, Dr. Kumar aims to expand his research into quantum computing areas like quantum calculi and formalism, quantum gates and circuits for secure communication, quantum key distribution, quantum visualization, and fostering innovation and bridging the gap between theoretical advancements and practical applications in associating quantum computing with real-time applications.    

Courses Taught

Dr. Nitesh Kumar Singh teaches a variety of courses, including:

  • Blockchain: fundamental and advanced concepts of distributed ledger technology, consensus mechanisms, and cryptographic security. It begins with an introduction to blockchain architecture, decentralized networks, and key components such as blocks, hash functions, and Merkle trees. The course explores consensus algorithms (e.g., Proof of Work, Proof of Stake, and Byzantine Fault Tolerance) and smart contracts using platforms like Ethereum and Hyperledger Fabric. Topics include blockchain security, scalability solutions (e.g., sharding, sidechains), and privacy-enhancing techniques (e.g., zero-knowledge proofs). The course also discusses real-world applications in finance (cryptocurrencies, DeFi), supply chain management, and identity verification. Advanced modules may cover interoperability, tokenomics, and the future of blockchain in emerging technologies such as quantum computing and AI. Hands-on projects involve developing smart contracts, deploying blockchain networks, and analyzing case studies of blockchain implementations.  
     
  • Cybersecurity: principles, technologies, and best practices for protecting digital systems, networks, and data from cyber threats. It begins with foundational topics such as security models, risk assessment, and threat intelligence, followed by network security, cryptographic techniques, and access control mechanisms. The course explores attack vectors, including malware, phishing, and social engineering, along with defensive strategies like firewalls, intrusion detection systems, and endpoint security. Advanced topics include ethical hacking, penetration testing, security auditing, and compliance with standards like ISO 27001 and GDPR. Emerging threats such as AI-driven cyberattacks, ransomware, and post-quantum security challenges are also discussed. Hands-on labs focus on vulnerability assessment, incident response, and securing cloud and IoT environments.
     
  • Cryptography and Network Security: mathematical foundations and practical applications of cryptographic algorithms and protocols to safeguard data and communications. It covers classical encryption methods, such as Caesar and Vigenère ciphers, and progresses to modern techniques like symmetric-key encryption (AES) and asymmetric-key encryption (RSA). Topics include digital signatures, hash functions, key exchange protocols (e.g., Diffie-Hellman), and public key infrastructures (PKI). The course explores network security protocols such as SSL/TLS, VPNs, and IPsec, focusing on securing communications over insecure channels. Advanced discussions cover the implications of quantum computing on cryptography and the development of post-quantum cryptographic algorithms. Hands-on sessions include implementing encryption algorithms, securing network traffic, and analyzing cryptographic vulnerabilities in real-world systems.
     
  • Discrete Mathematics: mathematical foundation essential for computer science and engineering. Topics include set theory, logic, functions, relations, and combinatorics, with a focus on their application to algorithms, data structures, and computation. The course covers graph theory, including trees, directed and undirected graphs, and algorithms like Dijkstra’s and Floyd-Warshall for shortest paths. Further, formal languages, finite automata, and regular expressions, as well as Boolean algebra and propositional logic for circuit design and logical reasoning. Additionally, the course addresses recurrence relations, mathematical induction, and discrete probability theory.
     
  • Computer Networks: network topologies, protocols, and the OSI and TCP/IP models. It explores data link layer technologies like Ethernet and Wi-Fi, along with routing and switching algorithms for the network layer. The course also covers transport protocols (TCP/UDP), application layer protocols (HTTP, FTP, DNS), and network security measures. Advanced topics may include network performance analysis, Quality of Service (QoS), software-defined networking (SDN), and cloud computing integration. Hands-on labs involve configuring network devices, analyzing traffic, and troubleshooting network issues.
     
  • Security Verification and Validation: formal verification techniques, such as model checking and theorem proving, to mathematically validate the security properties of systems. It includes testing strategies for identifying vulnerabilities through static and dynamic analysis, penetration testing, and security auditing. Topics also cover risk management practices, threat modeling, and the use of automated tools for security assessment. The course emphasizes the importance of validating security controls and compliance with standards such as OWASP, NIST, and ISO 27001, while offering practical experience in validating security measures through real-world case studies and hands-on labs.
     
  • Ethical Hacking: hacking methodologies, including reconnaissance, scanning, exploitation, and post-exploitation. Students learn about common attack vectors such as SQL injection, cross-site scripting (XSS), and buffer overflows, along with countermeasures and defensive strategies. The course also includes the use of popular hacking tools like Metasploit, Nmap, and Wireshark. Ethical hacking principles, legal and ethical responsibilities, and report writing are emphasized. Hands-on labs provide real-world experience in performing ethical hacks, identifying vulnerabilities, and recommending security improvements for organizations. 

Teaching Philosophy

According to Dr. Kumar, a teacher's ability to get students engaged in open-ended dialogues is critical to him or her. Conventional teaching methods may become less effective as the globe becomes more linked. When teaching, it is essential to instil in pupils an openness to new ideas and approaches. Students are more engaged when they are able to openly share their ideas with their peers. There will be guest lecturers and field trips planned for students at different points throughout the year. As soon as possible, I intend to make any required changes to my grading system in the event that my students are being penalised for performing exploratory work rather than results-oriented work. In other words, a more practical approach to computer science education should be prioritised above rote memorization in the classroom. Instead of giving students a series of smaller assignments, I prefer that they focus on a single large project. The criteria for this project's evaluation are very important to me. To be a successful educator in cryptography and security, it is imperative that I continue to play an important role in igniting students' enthusiasm in this or related subjects. Students learn critical thinking skills, evidence analysis skills, argumentation building skills, and effective communication skills in both written and spoken form in my classes. Students will benefit from these qualities both in the workplace and in the classroom as they face a variety of obstacles. All of my presentations were centred on psychological and scientific investigation. Research design and procedure, as well as critical evaluation in general, are elevated when the emphasis is on knowledge discovery. I make no exceptions when it comes to students' exposure to research material in my course preparations. Through in-class presentations and outside-of-class projects, students will have the chance to get first-hand research experience. To assist students better understand and apply the subject matter that they are studying, I often employ organised talks, demonstrations, and cooperative learning activities in my classroom. Students in my graduate programmes are expected to apply what they have learned in class to their own professional endeavours once they have graduated from my programmes. 

Scholarly Activities

  • Published impactful research in reputed journals like FGCS, JNCA, IJCS, IEEE Access, SIMPAT and many more, focusing on collision avoidance strategies and quantum calculi and formalism for efficient and secure computing and communication.
  • Presented findings at international conferences, including the European Control Conference, highlighting innovative approaches in systems engineering.
  • Contributed to open-source platforms by developing tools for vulnerability analysis and mitigation, accessible on GitHub.
  • Mentored undergraduate and postgraduate students in research projects, including cryptographic or network security tools development.
  • Collaborated on interdisciplinary projects involving large-scale data analysis and applied optimization.
  • Served as a peer reviewer for scientific journals, ensuring quality in research publications.
  • Led workshops on Python programming, cybersecurity, blockchain, engaging academic and industry participants.