Network Security with Cryptography

Authors(2) :-Pragya Sharma, Shashank Dahiya

In the present tech-savvy world, the growth in computer systems and their interconnections through networks has increased. With this the dependence of both organizations and the individuals on the information stored and communicated using these systems has also increased. This, in turn, has led to the reinforcement in security attacks and electronic frauds. Hence, there is indeed no time at which security does not matter and to protect systems from network based attacks. Network security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control and administrative and management policy required to provide an acceptable level of protection for hardware and software and information in a network. Cryptography is a technique that is used to enhance the network security. It protects users by providing functionality for the encryption of data and authentication of other users. There are many cryptographic techniques available and among them Advanced Encryption Standards (AES) is one of the most powerful techniques. In this paper a study on cryptography and its dimensions is done. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.

Authors and Affiliations

Pragya Sharma
Department of Computer Technology and Application, SGSITS, Indore, Madhya Pradesh, India
Shashank Dahiya
Computer Science Department , IET DAVV, Indore, Madhya Pradesh, India

Network Security, Cryptography, Cryptosystem.

  1. Simmonds, A; Sandilands, P; van Ekert, L (2004) Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317-323.
  2. Swarnalata Bollavarapu and Ruchita Sharma-? Data Security using Compression and Cryptography Techniques
  3. Pfleeger, C. P., & Pfleeger, S. L., Security in Computing, Upper Saddle River, NJ: Prentice Hall.2003.
  4. 'Data encryption standard', FIPS PUB 46, National Bureau of Standards,Washington, DC Jan. 1977
  5. William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition
  6. DIFFIE, W., and HELLMAN, M.: 'New directions in cryptography', IEEE Trans., 1976, IT-22, pp. 644-654
  7. Salomon, D., “Coding for Data and Computer Communications”, New York, NY: Spring Science and Business Media. 2005.
  8. Shannon, E. C., Communication theory of secrecy system, Bell System Technical Journal, Vol.28, No.4, 1949, pp.656- 715.
  9. SIMMONS, G.J.: 'Symmetric and asymmetric encryption', ACM Comput. Surveys, 1979, 11, pp. 305-330
  10. RIVEST, R.L., SHAMIR, A., and ADLEMAN, L: 'A method for obtaining digital signatures and public-key cryptosystems', CACM, 1978, 21, pp. 120-126

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 772-776
Manuscript Number : CSEIT1835206
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pragya Sharma, Shashank Dahiya, "Network Security with Cryptography", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.772-776, May-June-2018.
Journal URL :

Article Preview

Follow Us

Contact Us