Network Security and Cryptography
Network Security and Cryptography
ABSTRACT
In the era of the World Wide Web, e-commerce, and social networks, data
security has become a critical concern for organizations worldwide. As the
volume of online transactions and data exchanges grows, so does the risk of cyber
threats. Network security and cryptography play a vital role in protecting
sensitive information from unauthorized access, tampering, and theft. This paper
reviews the current state of network security and cryptographic concepts,
including encryption techniques, hash functions, digital signatures, and key
exchange protocols. The primary focus is on the security concerns of end systems
and entire networks, highlighting the need for robust security measures to prevent
cyber-attacks and data breaches. By examining the latest cryptographic
algorithms and techniques, this paper aims to provide a comprehensive
understanding of the importance of network security and cryptography in the
digital age.
KEY POINTS
• Network security concerns include secure access, end system security, and
entire network security
INTRODUCTION
LITERATURE SURVEY
Prof. Mukund R. Joshi, Renuka Avinash Karkade proposed the paper on Network
Security with Cryptography
In this paper the types of Security Attacks are discussed. Active Attacks do some
modification in data stream. The types of active attacks are Modification of
Message, Denial of Service, Replay and Masquerade. Modification of Messages
makes some changes or reorder the message format. Passive Attacks used for
monitoring the communication. In Traffic Analysis attacks the message is read by
third party. Release of Message Contents attacks the message read by sender and
receiver. Some Security Services are provided for data transmission. Data
Integrity, Data Confidentiality, Authenticity, Nonrepudiation and Access Control
are some of the security services provided by cryptography.
CRYTOGRAPHIC PRINCIPLES
A. Redundancy
B. Freshness
Asymmetric cryptosystems
It uses two different keys to send and receive the messages. It uses public
key for encryption and another key is used for decryption. Two user A and B
needs to communicate, A use public key of B’s to encrypt the message. B use
private key to decipher the text. It is also called as public key cryptosystems.
Diffie- Hellman key exchange generates both public and private key.
Symmetric cryptosystems
CRYPTOGRAPHIC MODEL
Encryption model
In Encryption model the plain text is converted into cipher text. There are
two types of keys are used in Encryption model. One is Symmetric key or private
key and another one is public key. In Symmetric encryption only one key is used
for communication. Plain text can be encrypted using some encryption algorithm.
Decryption model
In Decryption model the cipher text is converted into plain text using both
Symmetric and Asymmetric decryption. In symmetric decryption single key is
used for both encryption and decryption. In asymmetric key use two different
keys for communication.
CONCLUSION
3. Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security
using quantum cryptography. arXiv preprint arXiv:1412.2495.
4. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper
on Network Security and Cryptography. Advances in Computational Sciences
and Technology, 10(5), 763 770.
8. Kaur, S., Kaur, R., & Raina, C. K. (2017). Review on Network Security and
Cryptography.
9. Duong, T., & Rizzo, J. (2011, May). Cryptography in the web: The case of
cryptographic design flaws in asp. net. In Security and Privacy (SP), 2011 IEEE
Symposium on (pp. 481-489). IEEE.