Menu

Abstract: Cipher text: The transformed message. C.

0 Comment

Abstract:
Network
Security measures are needed to protect data during their transmission. Security
means that sending message without any changes or hacking done by unauthorized
persons. The network securities have the fundamental of cryptography technique
which acts like guard to the information. The generic concepts of cryptography
are encryption and decryption. There are many more cryptographic algorithms are
used to send the information as cipher text which cannot be understand by the
hackers. In this paper we also studied cryptography along with its principles.
Cryptographic systems with ciphers are described.

Keywords: Security,
Encryption, Decryption, Plain text, Cipher text.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

I.               
INTRODUCTION

Data often travels from one network
to another, leaving the safety of its protected physical surroundings. Once the
data is out of hand, unauthorized users with bad intention could modify or
duplicate your data, either for entertainment or for their own gain.

Network security is the most needed
component in information security, because it is responsible for securing all
data’s passed via networked computers. Network security problems can be divided
into four areas: Authentication, Secrecy, Integrity, and Non-repudiation.

Cryptography is an emerging
technology, which is important for network security. It is a needed of today’s
computer and communications networks.

I.               
TYPES
OF CRYPTOGRAPHY

Cryptography can be divided in two types,

·       
Symmetric key cryptography

·       
Asymmetric key cryptography

          A Symmetric key cryptography is uses
the same key to encrypt and decrypt data. The algorithms which come under the
symmetric key cryptography are, DES, TDES, AES, and RC4.

         

Fig
1: Symmetric Key Encryption

An Asymmetric key cryptography is uses the different
key to encrypt and decrypt data. The algorithms which come under the Asymmetric
key cryptography are, RSA, DHA, DSA, MD5, and ECC.

Fig
2: Asymmetric Key Encryption

II.          
CRYPTOGRAPHIC
TERMINOLOGY AND ALGORITHM

1.
TERMINOLOGY

A.  
Plain text:
The original message.

B.  
Cipher text:
The transformed message.

C.  
Encryption:
Converting the plain text to cipher text.

D.  
Decryption:
It is converting cipher text to plain text.

E.  
Cryptology:
Both cryptography and cryptanalysis.

2.
Algorithm

           A.DES: This is the ‘Data Encryption
Standard’. This is a cipher that operates on 64-bit blocks of data, using a
56-bit key.

           B.RSA: RSA is a public-key system
designed by Rivest, Shamir, and Adleman.

           C.HASH: A hash function which takes an
input and returns a fixed-size alphanumeric string.

           D.MD5: It was originally designed for use
as a secure cryptographic hash algorithm for authenticating digital signature.

           E.AES: This is the ‘Advanced Encryption
Standard approved by NIST.

 

III.   
CONCLUSION

The
day to day improving internet technology wants more and fast security for the
communication channel, over which the information is passing. Network Security
is the most vital component in information security because it is responsible
for securing all information passed through networked computers. We have
studied various cryptographic techniques to increase the security of network.

     The paper displayed different plans which are
utilized as a part of cryptography for network security reason. Cryptography, stable
with suitable communication protocols, can give a high intensity of protection in
digital communications against thief attacks as far as the communication between
two different systems is bothered.

x

Hi!
I'm Viola!

Would you like to get a custom essay? How about receiving a customized one?

Check it out