Network Security with Cryptography

Authors

  • Pragya Sharma  Department of Computer Technology and Application, SGSITS, Indore, Madhya Pradesh, India
  • Shashank Dahiya  Computer Science Department , IET DAVV, Indore, Madhya Pradesh, India

Keywords:

Network Security, Cryptography, Cryptosystem.

Abstract

In the present tech-savvy world, the growth in computer systems and their interconnections through networks has increased. With this the dependence of both organizations and the individuals on the information stored and communicated using these systems has also increased. This, in turn, has led to the reinforcement in security attacks and electronic frauds. Hence, there is indeed no time at which security does not matter and to protect systems from network based attacks. Network security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control and administrative and management policy required to provide an acceptable level of protection for hardware and software and information in a network. Cryptography is a technique that is used to enhance the network security. It protects users by providing functionality for the encryption of data and authentication of other users. There are many cryptographic techniques available and among them Advanced Encryption Standards (AES) is one of the most powerful techniques. In this paper a study on cryptography and its dimensions is done. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.

References

  1. Simmonds, A; Sandilands, P; van Ekert, L (2004) Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317-323.
  2. Swarnalata Bollavarapu and Ruchita Sharma-? Data Security using Compression and Cryptography Techniques
  3. Pfleeger, C. P., & Pfleeger, S. L., Security in Computing, Upper Saddle River, NJ: Prentice Hall.2003.
  4. 'Data encryption standard', FIPS PUB 46, National Bureau of Standards,Washington, DC Jan. 1977
  5. William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition
  6. DIFFIE, W., and HELLMAN, M.: 'New directions in cryptography', IEEE Trans., 1976, IT-22, pp. 644-654
  7. Salomon, D., “Coding for Data and Computer Communications”, New York, NY: Spring Science and Business Media. 2005.
  8. Shannon, E. C., Communication theory of secrecy system, Bell System Technical Journal, Vol.28, No.4, 1949, pp.656- 715.
  9. SIMMONS, G.J.: 'Symmetric and asymmetric encryption', ACM Comput. Surveys, 1979, 11, pp. 305-330
  10. RIVEST, R.L., SHAMIR, A., and ADLEMAN, L: 'A method for obtaining digital signatures and public-key cryptosystems', CACM, 1978, 21, pp. 120-126
  11. https://www.rapidsslonline.com

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Pragya Sharma, Shashank Dahiya, " Network Security with Cryptography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.772-776, May-June-2018.