Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021
AI
The report provides an overview of cryptography, its types, and the importance of securing digital information. It discusses the RSA algorithm, its vulnerabilities, and introduces a new cryptographic algorithm, S_RSA, designed to enhance security. The work includes evaluations, comparisons, and testing of S_RSA, aiming to offer a more reliable method for data encryption and decryption.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies. Cryptography and network security are used to protect network and data communication take place over wireless networks and data which is stored in our systems. Cryptography is a network security tactic that is used to protect enterprise information and communication from cyber threats through the use of codes(encryption) using techniques such as merging words with images, and other ways to hide information in storage or transit. In this paper, we discussed about cryptography process, security mechanism, security services, attacks, types of cryptography, Steganography.
NETWORK SECURITY AND CRYPTOGRAPHY , 2024
The idea of network security involves using encryption to secure data transmitted wirelessly and guarantee message contents remain confidential. The primary component of safe data transfer across an unstable network is data security. Authorizing access to data on a network, which is under the network administrator's authority, is a component of network security. Both the public and private sectors of computer networks use network security. Both private and public networks are utilized in businesses, organizations, universities, etc. Ensuring the security of end systems and the network as a whole is the responsibility of network security. Numerous applications, including those in banks, businesses, organizations, government agencies, and enterprises, require network security. Cryptography: When a sender applies a hash function-a cryptographic operation-to the original message, nobody else can decipher the message received save for the person holding the decipher key. A hash function is a mathematical representation of data, and the receiver determines the value of this hash function whenever any new data is received. Data security is achieved via a method known as cryptography. Therefore, it can be said that cryptography is a cutting-edge technology that is crucial to network security. Early on, however limited in its application, encryption was utilized to safeguard diplomatic correspondence, military secrets, and national security. The development of communication has led to a significant expansion in the spectrum of applications for cryptography in this modern domain. Cryptography is a vital tool for protecting electronic commerce and is practically necessary to guarantee that data is safe from intrusions.
International journal of engineering research and technology, 2018
Network Security is very severe problem nowadays. With the initiation of the World Wide Web and the emergence of e-commerce applications and social networks, organization across the world generate a large amount of data every day. One of the problems with mobile networks is the deficiency of security information of the networks. Unlike from organization and home networks, the security measures and situation of mobile networks are generally unknown to the end users. As a result, users may enter a mobile network bled with attacks without any past protection and suffer serious damages. Security is an important field that consists of the provisions made in underlying computer network infrastructure, policies adopted by the network administrator to protect the network, the network-available resources from unofficial access and the efficiency of these measures combined together. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a wider range of cryptographic algorithms that are used in networking applications.
IRJET, 2020
This paper aims to provide broad view of usage of cryptography in network security. Cryptography is defined as the science of protecting the data. On other hand network security is the process of keeping the information private, secret and secure from unauthorized and illegal access. Cryptography and network security is used to protect network and data communication takes place over wireless network and data which is stored in our systems. Security in this modern scenario has become a more and more sensible and critical issue, because the usage of computers and data networks go on increasing. Network security and cryptography is the subject which provides solutions to protect our information and data in digital form and to avoid security attacks and offers security services. Cryptography and network security is used in various applications like banking, shopping, government agencies, organization, military, secret services, enterprises, business, and in daily lives of peoples. In Cryptography various techniques and algorithms are used to provide security to networks and data. In this paper, we discussed about various encryption and decryption techniques, cryptographic principles, cryptosystem types and cryptographic model and its algorithm. There are six main security services which are availability, confidentiality, authentication, integrity, non-repudiation and access control. There are various security threats for our information like interception, interruption, unauthorized access and modification.
With the invention of the internet and new networking technologies, the world has become more interconnected. The concept of network securities is becoming more eminent due to easily acquirable intellectual properties. Network security covers an assortment of computer networks, both public and private, that are utilized as a part of ordinary activity directing exchanges and interchanges among organizations, government offices and people. In this research, discussion paper on the concept of network security as well as various types of network securities is done.
2005
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals.
2014
In today's information age, information sharing and transfer has increased exponentially. The information must be vulnerable and protected to unauthorised access and interception. With the development of network techniques the problem of network security becomes more and more important during storage and transmission of data. This paper introduces the concept of Network Security for Network Data, working and benefits of Network Security. We discussed how to protect your data. The concept of data hiding using encryption of data is explained here. Attempt has been made to develop a concept model for secure data transformation. In our model we will ensure that the data/information must be send safely at the other destination/port/terminal.
Science and Education Publishing
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-criminals. It comprises authorization of access to information in a network, controlled by the network administrator. The task of network security not only requires ensuring the security of end systems but of the entire network. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats.
International Journal for Research in Applied Science and Engineering Technology IJRASET, 2020
Currently, companies are more into using distributed systems and relying on network and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting companies information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and the hardware that use, store and transmit the information, to ensure integrity, confidentiality and availability of data and operation procedures are protected. In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact. I. INTRODUCTION Nowadays, most of the companies are interested in technology system in order to achieve a quicker procedure than the old-fashioned way, and for this system to be more effective, it must be saved from threats and information security must be maintained. The main objectives of information security that must be implemented to ensure the protection of data in any corporation are: (i) confidentiality, (ii) integrity and (iii) availability. The companies structure should be protected from active and passive attacks, such as (illegal access, unauthorized improvement of data and interruption) [1]. Information security and cyber security are both global and exciting subject for many researchers. The international standard, ISO/IEC 27002 (2005), defines Information Security as: "The preservations of the confidentiality, integrity and availability of information, for any form (hard copy or soft copy, electronic store, transmitted by email, or any other format)". While, the International Telecommunications Union (ITU) defines cyber security as follows: "Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user's assets" [2]. Both cyber security and information technology security requires continuous assessment and newness because they are vastly developed fields. Reputation and compromise intellectual property of organization will be affected by cyber attacks. Cyber attackers face problems in system security that uses multi-layer firewalls, so they depend on social engineering [3]. Due to the rapid increase of using technologies, that provide some comfort to the user, such as saving time and effort. The Internet of Things (IoT) is considered the best technology, with its applications that facilitate our work and live by providing features (i.e. connectivity, active engagement) that help us to achieve improvement, increase evolution and knowledge exchange. IoT is defined as a group of people and devices interconnected with each other. In addition, it allows devices to communicate with each other without involvement of human, it includes interconnected sensors of real world, devices of electronics and systems to the Internet. The main support of the IoT is the Internet. So that, any security threats that target the Internet can affect the IoT [4]. According to the importance of network and technology for any application, the security of network should be taken very important. The design of network depends on Open System Interface (OSI) model that gives many benefits when designing network security (e.g. flexibility, standardization of protocols, and easy to use). Network is unprotected to attacks while transferring data into communication channels. The security requirements of network are confidentiality and integrity. In addition, it is better to confirm that the complete network is secure when considering with network security [5]. In this paper, we will illustrate the factors effect on the multiple domains (Information System IS, cyber space, IoT and Network security) from various studies, to show how these factors effect and what are security requirements that can be used to reduce this effect. The reminder of this paper is organized as follows. Section II illustrates studies of various topics IS, Cyber space, IoT, and Network. In Section III, we discuss about different attacks that effect on security of multiple fields and the security requirements to prevent the attacks. Section IV is devoted to represent some relevant comments and concluding remarks.
International Journal for Recent Development in Science & Technology, 2020
Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.
2015
collaborative visualization where very high-end video transfers are used in oil exploration, or designing automobiles, etc. Further details of ITU-T security guidelines, other related matters are in [6]. 3. The Context of Security and the Threat-Scape in Cyber Warfare The bulk of this segment of the chapter and what follows it to the end of the chapter is taken from an ongoing research work at the School of Engineering, Design and Technology, University of Bradford.[7] It will cover security concepts, security engineering in context, a brief overview of cryptology(cryptography, cryptanalysis), social engineering, Distributed Denial of Service (DDoS) attack, IP Trace-back mechanism and the threat-scape in cyber warfare. This segment will be closed with some deductions.
Iconic Research and Engineering Journals, 2019
In present day Social systems administration framework Data security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Web has turned out to be increasingly across the board, if an unapproved individual can gain admittance to this system, he can keep an eye on us as well as he can without much of a stretch chaos up our lives. System Security and Cryptography is an idea to ensure system and information transmission over remote system. Today information correspondence for the most part relies on computerized information correspondence. The insurance of sight and sound information, delicate data like charge cards, banking exchanges and interpersonal organization security numbers is winding up significant. The security of this classified information from unapproved access should be possible with numerous encryption strategies. Likewise organize security issues are presently getting to be significant as society is moving towards computerized data age. As an ever increasing number of clients associate with the web it pulls in a great deal of digital offenders. The errand of system security not just requires guaranteeing the security of end frameworks however of the whole arrange. In this paper, an endeavor has been made to present the different Network Security and Cryptographic ideas.
Cryptography means secret writing. When the data are transferred from sender to receiver over the network through information channel any third parties can intensively read and may modify the data. Here in this paper we elaborate how cryptography will help to secure the data between authorized people. In order to transfer secure data the data will convert to unreadable form before transmitting to the channel. The cryptography applications range have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) This paper also provides a detailed description of cryptography techniques in Symmetric encryption and a public key cryptography algorithm RSA in Asymmetric encryption.
Network Security & Cryptography is a concept to protect network and data transmission over wireless network.Data Security is the main aspect of secure data transmission over unreliable network. Network security involves theauthorization of access to data in a network, which is controlled by the network administrator. Users choose or are assignedan ID and password or other authenticating information that allows them access to information and programs within theirauthority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobsconducting transactions and communications among businesses, government agencies and individuals. Networks can beprivate, such as within a company, and others which might be open to public access. Network security is involved inorganizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with itsprinciples. Cryptographic systems with ciphers are described.The cryptographic models and algorithms are outlined.
Computer and Network Security, 2020
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working in the field of cryptography, network security and security and privacy issues in the Internet of Things (IoT), and machine learning application in security. It will also be useful for faculty members of graduate schools and universities
Wireless Personal Communications, 2009
The Future Generation Communication and Networking (FGCN) with advanced communication and networking environment is emerging for user centric consideration. In addition, the FGCN has emerged rapidly as an exciting new paradigm that includes ubiquitous, grid, and peer-to-peer computing to provide computing and communication services anytime and anywhere. Therefore, it is aim to provide users with more convenient and pleasurable services. While attack methods and tools have become more and more powerful, interest has greatly increased in the field of building, active and smart defense systems. Finding effective ways to protect information and data of FGCN environment is also a very challenging research problem.
The Importance of Network Security in Protecting Sensitive Data and Information
Network security has remained a major concern especially in the modern world where technological advancement is rapidly evolving. This study explores the concept of data and information security especially in today's environment where cyber risks like malware, phishing, DDoS, and insider threats are rampant. It covers the fundamentals of the network's security measures such as Firewall, IDS, Encryption, Access control, VPNs, and Security Auditing & Monitoring. A qualitative analysis of secondary data and case studies such as the Equifax data breach and the Yahoo data hack is used to assess the effectiveness of these security measures in the real world. Regulatory compliance is also encouraged through the use of standards like GDPR, PCI DSS, and HIPAA to ensure that companies meet the set requirements; failing to do so attracts fines, lawsuits, or loss of reputation among other consequences. Measures like regular software updates and patching, secure user authentication, network segmentation and security consciousness among the workers should be adopted. These are important in avoiding risk occurrences, minimizing threats and providing a hardy protection for new risks. This will be a detailed step by step guide to help organizations improve their network security, manage compliance and data protection in the interconnected world of today, with a focus on the importance of strong network protection in ensuring data integrity and trust.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.