Abstract: Cipher text: The transformed message. C.
Security measures are needed to protect data during their transmission. Security
means that sending message without any changes or hacking done by unauthorized
persons. The network securities have the fundamental of cryptography technique
which acts like guard to the information. The generic concepts of cryptography
are encryption and decryption. There are many more cryptographic algorithms are
used to send the information as cipher text which cannot be understand by the
hackers. In this paper we also studied cryptography along with its principles.
Cryptographic systems with ciphers are described.
Encryption, Decryption, Plain text, Cipher text.
Data often travels from one network
to another, leaving the safety of its protected physical surroundings. Once the
data is out of hand, unauthorized users with bad intention could modify or
duplicate your data, either for entertainment or for their own gain.
Network security is the most needed
component in information security, because it is responsible for securing all
data’s passed via networked computers. Network security problems can be divided
into four areas: Authentication, Secrecy, Integrity, and Non-repudiation.
Cryptography is an emerging
technology, which is important for network security. It is a needed of today’s
computer and communications networks.
Cryptography can be divided in two types,
Symmetric key cryptography
Asymmetric key cryptography
A Symmetric key cryptography is uses
the same key to encrypt and decrypt data. The algorithms which come under the
symmetric key cryptography are, DES, TDES, AES, and RC4.
1: Symmetric Key Encryption
An Asymmetric key cryptography is uses the different
key to encrypt and decrypt data. The algorithms which come under the Asymmetric
key cryptography are, RSA, DHA, DSA, MD5, and ECC.
2: Asymmetric Key Encryption
TERMINOLOGY AND ALGORITHM
The original message.
The transformed message.
Converting the plain text to cipher text.
It is converting cipher text to plain text.
Both cryptography and cryptanalysis.
A.DES: This is the ‘Data Encryption
Standard’. This is a cipher that operates on 64-bit blocks of data, using a
B.RSA: RSA is a public-key system
designed by Rivest, Shamir, and Adleman.
C.HASH: A hash function which takes an
input and returns a fixed-size alphanumeric string.
D.MD5: It was originally designed for use
as a secure cryptographic hash algorithm for authenticating digital signature.
E.AES: This is the ‘Advanced Encryption
Standard approved by NIST.
day to day improving internet technology wants more and fast security for the
communication channel, over which the information is passing. Network Security
is the most vital component in information security because it is responsible
for securing all information passed through networked computers. We have
studied various cryptographic techniques to increase the security of network.
The paper displayed different plans which are
utilized as a part of cryptography for network security reason. Cryptography, stable
with suitable communication protocols, can give a high intensity of protection in
digital communications against thief attacks as far as the communication between
two different systems is bothered.