The Literature Review on The Role and Significance of Cryptography for Network Security in Current Scenario

As the internet has gotten more integrated into our daily lives and has grown exponentially over the last several decades, data security has become a major issue for everybody connected to the internet. Data security ensures that only the intended recipients have access to our information and prohibits any data modification or manipulation. Various techniques and approaches have been developed to reach this level of security. Cryptography is described as a set of techniques for encrypting data using specified algorithms that render the data unreadable to the naked eye unless decoded using procedures predefined by the sender. We cover some of the most recent research in the fields of cryptography and network security in this article. The security vulnerabilities of existing as well as upcoming technologies in the field of Computer Networks are discussed in these research articles. We bundle the articles together based on their content and categorise the research subjects based on their implementation throughout the seven layers of the well-known OSI reference model. In the interest of brevity, the main purpose for each research study is outlined, and the proposed solution is stated simply.


I. INTRODUCTION
Cryptography is a method of ensuring message confidentiality. In Greek, the phrase has a special meaning: "hidden writing." Nowadays, however, individuals and organisations' privacy is protected by high-level cryptography, which ensures that information delivered is secure and only the authorised receiver has access to it. Cryptography is a traditional method that is continuously being explored, with historical roots. Examples date back to 2000 B.C., when the ancient Egyptians used "secret" hieroglyphics, as well as additional evidence from ancient Greece and Rome, such as secret writings and the renowned Caesar cypher.
Hundreds of millions of people use cryptography on a regular basis to protect data and information, while the majority are unaware of it. Cryptographic systems, in addition to being incredibly valuable, are also extremely brittle, as a single programming or specification error can compromise them.
We live in an information age, which necessitates the storage of data on every element of our life. This information may be regarded of as an asset, and like any other asset, it must be protected against attacks.
Information must be hidden from unauthorised access (confidentiality), protected from unauthorised change (integrity), and accessible only to an authorised entrance when it is needed to be secure (availability). As a result, the three most critical security goals are confidentiality, integrity, and availability.
Computers have unquestionably grown omnipresent in today's world, and as a result, the majority of this data has been converted to electronic form.
Furthermore, thanks to the internet, this information is now widely disseminated. Authorized users can now use computer networks to communicate and retrieve data from afar. Although the three security goals listed above-confidentiality, integrity, and availability-remain critical, they now have new dimensions. Not only must the computers containing the data be secure, but the network must also be secure.
A network administrator's provisions and rules for preventing and monitoring illegal access, misuse, modification, or denial of a computer network and network-accessible resources are known as network security. In terms of network security, cryptography is a crucial technology. The science and art of changing signals to make them secure and impervious to attacks is referred to as cryptography. Symmetric-Key Encryption, Asymmetric-Key Encryption, and Hashing are the three mechanisms used in cryptography. Asymmetric-Key Encryption employs two keys: one public key and one private key, whereas Symmetric-Key Encryption uses a single secret key for both encryption and decryption. The data is encrypted using the sender's public key, and the message is decrypted using the receiver's private key. Hashing creates a fixed-length message digest from a variable-length message and transmits both the message and the digest, ensuring data integrity.
Despite the fact that several approaches have been created to assure network security, network dangers continue to exist. As a result, a great deal of research is being done in the field of network security. Cryptography is a method of ensuring message confidentiality. In Greek, the phrase has a special meaning: "hidden writing." Nowadays, however, individuals and organisations' privacy is protected by high-level cryptography, which ensures that information delivered is secure and only the authorised receiver has access to it. Cryptography is a traditional method that is continuously being explored, with historical roots. Examples date back to 2000 B.C., when the ancient Egyptians used "secret" hieroglyphics, as well as additional evidence from ancient Greece and Rome, such as secret writings and the renowned Caesar cypher.
Hundreds of millions of people use cryptography on a regular basis to protect data and information, while the majority are unaware of it. Cryptographic systems, in addition to being incredibly valuable, are also extremely brittle, as a single programming or specification error can compromise them.
We live in an information age, which necessitates the storage of data on every element of our life. This information may be regarded of as an asset, and like any other asset, it must be protected against attacks.
Information must be hidden from unauthorised access (confidentiality), protected from unauthorised change (integrity), and accessible only to an authorised entrance when it is needed to be secure (availability). As a result, the three most critical security goals are confidentiality, integrity, and availability.
Computers have unquestionably grown omnipresent in today's world, and as a result, the majority of this data has been converted to electronic form.
Furthermore, thanks to the internet, this information is now widely disseminated. Authorized users can now use computer networks to communicate and retrieve data from afar. Although the three security goals listed above-confidentiality, integrity, and availability-remain critical, they now have new dimensions. Not only must the computers containing the data be secure, but the network must also be secure. Khalifa et al. [2]. As a result, cryptography will always play a role in data and information security, both today and in the future.
Moving on to the objectives of cryptography, James L.
Massey et al. [7] pointed out that there are two objectives that cryptography seeks to achieve: Mohammed et al. [27] propose utilising a reportbased payment structure for multihop wireless networks to encourage node cooperation, manage packet transport, and ensure fairness. Lightweight payment reports are sent to the accounting centre instead of receipts, and indisputable security tokens are maintained in the form of "Evidences," so any node suspected of cheating can be asked to provide its "proof" to be verified.
Udi Ben-Porat et al. [28] describe Distributed Denial of Service attacks, which impair server performance by repeatedly forwarding insignificant packets over the network, affecting not only the host but all clients. The paper seeks to build efficient defence mechanisms against DDoS attacks using one of the most common data structures in Network Systems (Hash Tables). From a security standpoint, this research compares Open vs. Closed hashing.
The quantification of a network's total security is discussed by Nayot et al. [29]. Individual components must be measured in relation to one another in order to achieve this. For this, attack graphs are created, which can be used to determine network weaknesses.
When it comes to assessing the causal linkages between network variables, however, models like attack graphs fall short. The concept of Bayesian Attach Graphs is thus introduced in this study.
Bayesian graphs are directed acyclic graphs with nodes representing random variables and edges representing conditional dependencies. Following that, the study provides a risk management methodology based on Bayesian Attack Graphs that allows a network administrator to quantify the security degree of a deployed network.
Walter Cerroni et al. [30]   and a suitable defence mechanism is implemented.

III. Cryptography Concept
The basic premise of a cryptographic system is to encrypt information or data in such a way that an unauthorised person cannot deduce its meaning. Cryptography is commonly used to send data via an unsecured channel, such as the internet, or to ensure that unauthorised persons do not comprehend what they are looking at in a case where they have accessed the information.
In cryptography, the obfuscated data is known as "plaintext," and the process of concealing it is known as "encryption." The encrypted plaintext is known as "ciphertext." This is accomplished through a set of rules known as "encryption algorithms." Typically, the encryption process uses a "encryption key," which is passed to the encryption algorithm together with the data as input. The receiving side can extract the information using a "decryption algorithm" and the necessary "decryption key".

IV. Conclusion
Authentication, integrity, confidentiality, and norepudiation are only a few of the major security goals that cryptography helps to achieve. To fulfil these objectives, cryptographic algorithms are created. The objective of cryptography is to provide reliable, strong, and robust network and data security. We presented a summary of some of the research that has been done in the subject of cryptography, as well as an explanation of how the various algorithms used in cryptography for various security goals work in this paper. In order to protect personal, financial, medical, and ecommerce data while maintaining a reasonable level of privacy, cryptography will continue to be used in IT and business plans.
As the relevance and importance of data privacy grows, so does the importance of network security and cryptography. It is never an absolute procedure to provide network security, but rather an iterative one. As a result, Network Security and Cryptography are currently at the forefront of study.
V. REFERENCES