0% found this document useful (0 votes)
2 views10 pages

Network Security and Cryptography

This paper discusses the critical importance of network security and cryptography in protecting sensitive data amidst rising cyber threats in the digital age. It reviews various cryptographic techniques, including encryption, hash functions, and key exchange protocols, while emphasizing the need for robust security measures to prevent data breaches. The document also explores different cryptosystem types and their applications in ensuring secure communication over networks.

Uploaded by

facapa9164
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views10 pages

Network Security and Cryptography

This paper discusses the critical importance of network security and cryptography in protecting sensitive data amidst rising cyber threats in the digital age. It reviews various cryptographic techniques, including encryption, hash functions, and key exchange protocols, while emphasizing the need for robust security measures to prevent data breaches. The document also explores different cryptosystem types and their applications in ensuring secure communication over networks.

Uploaded by

facapa9164
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Network Security and Cryptography:

Ensuring Data Protection in the Digital Age


Gubberan. R, Research Scholar, Department of Computer Science, Yenepoya
(Deemed to be University), Karnataka, India. Reg No: 24MSCB002,
33265@yenepoya.edu.in
Dr. Ningthoujam Chidananda Singh, Faculty Head, Department of Computer
Science, Yenepoya (Deemed to be University), Karnataka, India.
chidananda.blr@yenepoya.edu.in

ABSTRACT

In the era of the World Wide Web, e-commerce, and social networks, data
security has become a critical concern for organizations worldwide. As the
volume of online transactions and data exchanges grows, so does the risk of cyber
threats. Network security and cryptography play a vital role in protecting
sensitive information from unauthorized access, tampering, and theft. This paper
reviews the current state of network security and cryptographic concepts,
including encryption techniques, hash functions, digital signatures, and key
exchange protocols. The primary focus is on the security concerns of end systems
and entire networks, highlighting the need for robust security measures to prevent
cyber-attacks and data breaches. By examining the latest cryptographic
algorithms and techniques, this paper aims to provide a comprehensive
understanding of the importance of network security and cryptography in the
digital age.

KEY POINTS

• Network security and cryptography are essential for protecting sensitive


information in the digital age
• Cyber threats are increasing with the growth of online transactions and data
exchanges

• Network security concerns include secure access, end system security, and
entire network security

• Cryptographic algorithms, such as encryption, hash functions, and digital


signatures, are crucial for data protection

• Key exchange protocols, like Diffie-Hellman and Elliptic Curve Diffie-


Hellman, ensure secure communication between parties

INTRODUCTION

Network Security is responsible for providing security to all the


information passed over the internet from one computer to other. Network
Security refers to all software and hardware functions, accountability, features,
administrative and management, measures, characteristics, access control,
information in a network and operational procedures are acceptable level to
protect software and hardware. Cryptography is one of the emerging technologies
used for providing security to data. The authorized user should provide user ID
and password or any other unique data to access secured data. It used to keep the
information more secure and safe. There are four network security problems:
nonrepudiation, secrecy, confidentiality and authentication. Secrecy is a term
used for keeping the data more confidential without accessed by unauthorized
users. Authentication need to keep the data more sensitive. Nonrepudiation
always deals with signature. Message Integrity used to ensure the secure
connection between sender and receiver. Cryptography is the process of writing
in secret code. Cryptography has many applications like computer passwords,
ATM cards, e-commerce, electronic commerce, business applications and also in
some other applications. Cryptography is nothing which is closely related to
cryptology and cryptanalysis. Two technologies are used in cryptography.
Encryption used in sender side and the decryption is used in receiver side. The
decryption cannot perform without knowledge of encryption. Cryptanalysis is
used for “breaking the code”. The area where we have both cryptanalysis and
cryptography is called as cryptology. There are many powerful techniques but
among them AES is one of the most powerful and useful techniques.
Cryptography use many algorithms and some principles.

LITERATURE SURVEY

Prof. Mukund R. Joshi, Renuka Avinash Karkade proposed the paper on Network
Security with Cryptography

In this paper some principles of cryptography are discussed. The Redundancy


and Freshness are two principles used in cryptography. The message should be
encrypted at the sender side but all the encrypted message contains some
redundancy. The freshness use timestamp to receive the message. The time is set
for each message the received message is within the time limit the message is
accepted. The message exceeds the time limit before receiving to receiver, those
messages are discarded. Two classes are used in cryptography, symmetric and
asymmetric cryptographic algorithm. In symmetric cryptographic algorithm same
key is used in both sender and receiver side. But in asymmetric cryptographic
algorithm different key is used in sender and receiver side. In encryption the plain
text is converted into cipher text. The decryption is reverse process of encryption,
covert cipher text into plain text. Cryptographic system provides privacy and
authentication in communication system. Asymmetric cryptosystems use two
types of keys one is public key and another one is private key. The key distribution
is suggested by Diffie and Hellman. Symmetric cryptosystems use data
encryption standard (DES) and rotor ciphers.

Shyam Nandan Kumar proposed Review on Network Security and Cryptography

In this paper the types of Security Attacks are discussed. Active Attacks do some
modification in data stream. The types of active attacks are Modification of
Message, Denial of Service, Replay and Masquerade. Modification of Messages
makes some changes or reorder the message format. Passive Attacks used for
monitoring the communication. In Traffic Analysis attacks the message is read by
third party. Release of Message Contents attacks the message read by sender and
receiver. Some Security Services are provided for data transmission. Data
Integrity, Data Confidentiality, Authenticity, Nonrepudiation and Access Control
are some of the security services provided by cryptography.

Madhumita Panda proposed a paper on Security in Wireless Sensor Networks


using Cryptographic Techniques

In this paper the Cryptography is used in Wireless Sensor Network to provide


security to the wireless communication. Some security requirements are used in
wireless sensor network like Confidentiality, Authentication, Integrity and
Availability. Some obstacles of sensor security are used within a Very Limited
Resources. The Very Limited Resources includes Limited Memory and Storage
Space, Power Limitation and Transmission range. Unreliable Communication is
also one of the obstacles Unreliable Transfer, Conflicts and Latency. Unattended
Operation is one of the obstacles like Exposure to Physical Attacks, Managed
Remotely and Lack of Central Management Point. Symmetric key is also called
as secrete key. It uses only one key on both sender and receiver side. Asymmetric
Cryptography is called as public-key cryptography. It uses different keys on both
sender and receiver side.

CRYTOGRAPHIC PRINCIPLES

A. Redundancy

Cryptographic principle 1: All the encrypted message contains some redundancy,


there is no need of understanding the message by information.

B. Freshness

Cryptographic principle 2: Timestamp is used in every message. For instance, the


time stamp is of 10sec for every message. The receiver keeps the message around
10sec to receive the message and filter the output within that 10sec. The message
exceeds the timestamp it is throw out.
CRYPTOSYSTEM TYPES

Asymmetric cryptosystems

It uses two different keys to send and receive the messages. It uses public
key for encryption and another key is used for decryption. Two user A and B
needs to communicate, A use public key of B’s to encrypt the message. B use
private key to decipher the text. It is also called as public key cryptosystems.
Diffie- Hellman key exchange generates both public and private key.

Symmetric cryptosystems

In Symmetric cryptosystems both the enciphering and deciphering keys


are identical or sometimes both are related to each other. Both the key should be
kept more secure otherwise in future secure communication will not be possible.
Keys should be more secure and it should be exchanged in a secure channel
between two users. Data Encryption Standard (DES) is example of Symmetric
cryptosystems.

CRYPTOGRAPHIC MODEL

Encryption model

In Encryption model the plain text is converted into cipher text. There are
two types of keys are used in Encryption model. One is Symmetric key or private
key and another one is public key. In Symmetric encryption only one key is used
for communication. Plain text can be encrypted using some encryption algorithm.

Decryption model

In Decryption model the cipher text is converted into plain text using both
Symmetric and Asymmetric decryption. In symmetric decryption single key is
used for both encryption and decryption. In asymmetric key use two different
keys for communication.
CONCLUSION

Cryptography is one of the most important components to provide security


to data communication between networks. It used to protect data from
unauthorized users. The key is exchanged between sender and receiver should be
done more in secure way. The key should be known only to sender and receiver
otherwise security issue will gets arise. In this paper the cryptosystem with its
model is discussed regarding the network security. The data can be compressed
to reduce the cost for communication. The redundancy can be avoided after data
compression it reduce the storage space. There are two types of compression used
in network security to compress the data. Lossy and Lossless methods are two
compression methods. Some cryptographic algorithms are used in network
security to provide the secured communication. The exchange of key should be
done more secure. Cryptography and network security is used in data
communication over internet to provide the security.
REFERENCE

1. Preneel, B. (2010, September). Cryptography for network security: failures,


successes and challenges. In International Conference on Mathematical Methods,
Models, and Architectures for Computer Network Security (pp. 36-54). Springer,
Berlin, Heidelberg.

2. Kumari, S. (2017). A research Paper on Cryptography Encryption and


Compression Techniques. International Journal of Engineering and Computer
Science, 6(4).

3. Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security
using quantum cryptography. arXiv preprint arXiv:1412.2495.

4. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper
on Network Security and Cryptography. Advances in Computational Sciences
and Technology, 10(5), 763 770.

5. Panda, M. (2014). Security in wireless sensor networks using cryptographic


techniques. American Journal of Engineering Research (AJER), 3(01), 50-56.

6. Dhamdhere Shubhangi, T., & Gumaste, S. V. Security in Wireless Sensor


Network Using Cryptographic Techniques.

7. Kumar, S. N. (2015). Review on network security and cryptography.


International Transaction of Electrical and Computer Engineers System, 3(1), 1-
11.

8. Kaur, S., Kaur, R., & Raina, C. K. (2017). Review on Network Security and
Cryptography.
9. Duong, T., & Rizzo, J. (2011, May). Cryptography in the web: The case of
cryptographic design flaws in asp. net. In Security and Privacy (SP), 2011 IEEE
Symposium on (pp. 481-489). IEEE.

10. Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson


Education India.

11. Krishnamoorthy, Dr, and S. Chidambaranathan. "Clever Cardnovel


Authentication Protocol (NAUP) in Multi-Computing Internet of Things
Environs." (2017).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy