Wednesday, December 11, 2019
Cryptography in Network Security-Free-Samples-Myassignmenthelp
Question: Discuss about the Role of Cryptography in Network Security Principles and Practice. Answer: Overview of the interested area The area that has been chosen for literature search and review is Cryptography. It has been chosen as the area of research as in this modern world of electronic communication, the security of data is a major concern. Hence, Cryptography plays an important role in ensuring that data is protected and unauthorized access is restricted. This area is rising to be the emerging trend in network security as it will allow the people to be confident upon the electronic world. The interest in this area of research is growing rapidly as Cryptography is related to security of networks and data. Importance of chosen research papers The six papers that have been chosen for this literature research are being presented in the below section along with details of the work reflected in each paper. The papers been chosen for this study are of utmost importance as those illustrates on the concept of cryptography and the role being played by it for the security of data as well as networks. The discussions based on various cryptographic techniques have also been reflected in the research papers to demonstrate the suitable techniques that can be or are being used in real world applications. Hence, the six papers that have been chosen are critical for this literature research on cryptography. Brief overview of work presented in each paper Paper 1 Kumar, S.N., 2015. Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), pp.1-11. In this paper, the author has made an attempt to review the concept of cryptography and network security. There is large amount of data being produced daily in organizations with the increasing usage of Internet, e-commerce applications as well as social networks. The most critical issue that is rising in context to data is security to ensure that information is transmitted safely. The issues of network security is also arising as one of the important aspect in this age of digital information. Hence, in this paper Kumar (2015), has discussed about the various cryptographic algorithms being used in network applications. Paper 2 Joshi, M.R. and Karkade, R.A., 2015. Network security with cryptography. International Journal of Computer Science and Mobile Computing IJCSMCVol, 4, pp.201-204. In this paper, the authors Joshi and Karkade (2015), have presented network security and cryptography as the concept of protecting the network along with transmission of data being carried out over wireless networks. In an unreliable network, the major concern while data transmission is security of the data or information. The security of a network comprises of authorization so that data can be accessed in a network which is under the control of network administrator. The work that has been presented in this paper comprises of the importance of cryptography, principles of cryptography and the various types of cryptographic systems. Paper 3 Babita, E. and Kaur, E.G., 2017. A Review: Network Security Based On Cryptography Steganography Techniques.International Journal,8(4). In this modern age of technology, digital communication is emerging as important medium for ensuring security of information being transmitted in between the sender and receiver. Hence, security is an essential aspect while exchanging of information to ensure that the information is secure from intruders or attackers. In this paper, the authors Babita and Kaur (2017), have illustrated on the hierarchy of techniques being used for network security. Further, the authors have discussed on Cryptography and Steganography as security mechanisms being used popularly. Cryptography is used for encryptions and decryption of data for secure transmission while Steganography is used to hide data within other cover media. Paper 4 Acharya, K., Sajwan, M. and Bhargava, S., 2014. Analysis of Cryptographic Algorithms for Network Security.International Journal of Computer Applications Technology and Research,3(2), pp.130-135. The major role being played by cryptography is securing of data while transmission of data or information over network. The function of this technique is to ensure that contents of a message or information are being transmitted confidentially and are not altered. Cryptography is also an essential aspect in context to challenges associated with IT security as it comprises of privacy, confidentiality as well as identity which in turn offers platform for trusted e-commerce along with secure communication. In this paper, the authors Acharya, Sajwan and Bhargava (2014), have analyzed some well-known algorithms related to cryptography and demonstrated the differences between existing techniques for encryption. Paper 5 Kapoor, V. and Yadav, R., 2016. A Hybrid Cryptography Technique for Improving Network Security.International Journal of Computer Applications (09758887) Volume. The primary concern of network providers along with service providers is data and security of the network. Hence, cryptographic techniques are being used for ensuring security of data at the time of data transmission for various communication purposes. The traditional cryptographic techniques are unable to provide the required level of security as the attackers now a days are aware of the techniques and knows about the solution. Therefore, there is a need for new type of cryptographic technique so as to improve the security as well as complexity of data cipher. In this paper, Kapoor and Yadav (2016), have presented a hybrid cryptographic technique to improve security of data while transmitting over network. The cryptographic technique that has been proposed in this paper, promises to offer highly secure technique for cipher generation with the help of RSA, DES as well as SHA1 technique. Paper 6 Anandakumar, S., 2015. Image Cryptography Using RSA Algorithm in Network Security.International Journal of Computer Science Engineering Technology,5(9). In this modern world of digital communication, it is crucial that there is application of proper encryption and decryption while data is being transmitted from one place to other through Internet for preventing unauthorized access. In this paper, Anandakumar (2015), have illustrated on Image Cryptography which is considered as a special type of technique for encryption so that data can be hidden in an image to encrypt or decrypt original message on the basis of some key value. In this type of cryptography, RSA algorithm is being used for encrypting image files so that security is enhanced in the area of communication for transmitting data. Significant Paper Critique Introduction The significant paper that has been chosen from the six research papers for this study is Analysis of Cryptographic Algorithms for Network Security, as this paper significantly discusses on the role being played by Cryptography and the various algorithms that are used for network security. The function of Cryptography is to ensure that contents of a message or information are being transmitted confidentially and are not altered. In this paper, the authors Acharya, Sajwan and Bhargava (2014), have analyzed some well-known algorithms related to cryptography and demonstrated the differences between existing techniques for encryption. The paper have been chosen to critically evaluate the significance of the work being presented by the authors along with how it contributes to knowledge in the particular area. Further, discussions are carried out on the practical application of work being presented along with evaluating presentation of the paper and providing recommendations for making imp rovements in the work. Significance of the research This research shows that the major role being played by cryptography is securing of data while transmission of data or information over network. The authors of this paper have illustrated that the mechanism based on cryptography are the building blocks for computer security. Cryptography can be associated wherever in the TCP/IP stack, be that as it may not be typical at physical layer. Cryptography is in like manner used as a piece of tangled traditions that help to fulfill unmistakable security organizations, in this way called security traditions. The standard feature of implementing the program for encryption and decryption is generation of encryption key. Presently every day, cryptography has numerous business applications. In the event that classified data has been secured then cryptography gives abnormal state of isolation for individuals and gatherings. In any case, the key reason for the cryptography can be utilized not simply to offer classification, but rather additionally to offer responses for various issues like learning quality, approval and non-renouncement. Cryptography is the strategies that enable data to be sent in a shielded from such that the main genuine radio ready to get to that data. The specialists Acharya, Sajwan and Bhargava (2014), have effectively demonstrated that Cryptography not simply shields learning from burglary or change, but rather may likewise be utilized for buyer validation. It is required to utilize powerful techniques for encryption and unscrambling to help learning security. Cryptography gives a few wellbeing destinations to guarantee the isolation of learning, non-modification of information a nd so forth. System security includes the approval of utilization of information in a framework, which can be overseen by the framework overseer. The underlying secured learning is known as plain content. It is secured in to figure content, that will therefore be unscrambled in to workable plain content. Cryptographic estimations are arranged on the establishment of the measure of essential which can be utilized for encryption and decoding. Contribution to knowledge The paper has contributed significantly towards gaining the knowledge and Cryptography and its importance in network security. The authors of the paper have clearly mentioned the various roles being played by cryptography along with different existing cryptographic algorithms. The authors have stated that encryption is not just a gadget for spies and developers, it can be a noteworthy asset in the business world. The authors have also presented a suitable example that whenever valuable information related to business processes or transactions is transmitted through mail or other medium with the help of Internet, then there is a need to use encryption. They also illustrated that there are various other critical applications for encryption that are more unremarkable than trade insider certainties, as budgetary data, helpful or true blue information and so on. From this research paper, knowledge has also been gained that the simple component of encryption is utilizing a scientific capac ity to the plaintext and changing it to an ensured figure. The harder part is to ensure that the people who are probably going to decipher that idea may accomplish this easily, however simply those approved can translate it. The authenticity of the scientific capacity persuading utilized should be built up to ensure that it is adequately muddled and scientifically solid to give a high measure of security. The journalists clarified that cryptographic equations are classified on the premise of the amount of keys which are utilized for encryption as well as decryption. From the review on this paper, it has been determined that before implementation of an encryption algorithm, there is a need to comprehend the hypothesis behind the security i.e. to secured data displayed inside a data or document and to guarantee that the data is incoherent to others. The fundamental sort of the security frame could be the symmetric basic encryption. More, the specialists have demonstrated that in the symmetric basic security both for the security and decoding technique precisely the same is utilized. In this manner the mystery of the key is saved and it is kept private. It works with substantial speed. The symmetric basic security requires place in two approaches both since the block ciphers or supply ciphers. Among the key advantages of utilizing the symmetric fundamental security is that the computational energy to this security strategy is little. The keys for this are unmistakable or there exists a simple change between the two keys. The specialists have likewise fixated on unequal fundamental security which truly is where in reality the keys are distinctive for the strategy for security and the decryption. They are otherwise called individuals fundamental encryption. Open fundamental techniques are vital since they can be used for transmitting security keys or other data solidly quite the both the general population do not have any opportunity to concur with a mystery enter in private. Improper calculations are for the most part steady and it is unrealistic to use them to scramble a lot of information. The keys utilized as a part of open key security calculations are for the most part significantly longer that expands the security of the data being transmitted. Practical application of the work The authors Acharya, Sajwan and Bhargava (2014), has discussed about Quantum cryptography in one of the sections of this paper, which is an innovation by which two gatherings can secured framework correspondences by applying the wonders of quantum material science. Thus, that report has a functional program in the realm of electronic correspondence while the security of transmissions depends on the sacredness of the directions of quantum mechanics. By the by, the writers likewise expressed that Quantum cryptography is just used to create and spread an indispensable, not to transmit any importance information but rather that cryptography is not quite the same as regular cryptographic frameworks. It depends more on science, instead of number juggling, as a basic part of their wellbeing model. Quantum cryptography utilizes late learning of science to build up a cryptosystem that cannot be vanquished. This implies it is completely ensured against being traded off without information of t he sender or the recipient of the messages. The master of quantum cryptography is that it disposes of the issue of key dispersion. An individual can propose a vital by sending a few photons with subjective polarizations. That routine would then be able to be appropriately used to deliver a progression of numbers (Acharya, Sajwan and Bhargava 2014). The technique is known as quantum key appropriation. In the event that the fundamental component is blocked by a spy, this truly is regularly found and it is of no result, since it is just an arrangement of discretionary segments and could be disposed. The sender would then be able to transmit still another key. After an indispensable has been firmly received, it works to a great degree well to scramble a note that could be conveyed by outdated medium like telephone, email, or common postal mail. The authors of this paper have also illustrated on the various aspects that have to be taken into consideration for selecting appropriate cryptographic scheme. Hence, this paper has a real world application in the field of data and network security for network administrators and service providers. The constraints for selection of appropriate cryptographic algorithm are illustrated as below: Time This factor comprises of determining time that is required to encrypt as well as decrypt data along with the time that is required for fulfilling the requirements before beginning an encryption. Memory This constraint relates to the memory that is required especially for small and smart gadgets such as PDA, smart card as well as RFID tags. Security This factor relates to the certain aspects like confidentially, integrity and availability is being maintained by the encryption scheme that has been selected. Nature of Data This means importance of the data or information that is being transmitted over a network. It is not that much important if it is small in size, then any encryption scheme can be chosen and applied. If the data being transmitted is of utmost importance or it is highly confidential then hybrid scheme that is symmetric + asymmetric have to be selected as the suitable cryptographic scheme. Moreover, Acharya, Sajwan and Bhargava (2014), have also presented the various essential aspects upon which the performance of cryptographic algorithms are dependent as below: Tunability It may be truly wanted to figure out how to powerfully decide the secured part and the encryption parameters with respect to different applications and necessities. Settled importance of secured part and secured parameters limits the ease of use of the framework to a restricted gathering of uses. Computational Speed In a few ongoing applications, it is fundamental that the encryption and unscrambling equations are rapidly enough to meet continuous necessities. Basic Period Value In the encryption systems the critical thing organization is the vital perspective that uncovers how the information is scrambled. The photo lessening the encryption extent is dependent on this vital length (Acharya, Sajwan and Bhargava 2014). The symmetric calculation utilizes a variable urgent period which is of the more extended. Consequently, the essential thing organization is a significant perspective in encryption preparing. Encryption Percentage The encryption extent is the measure of the measure of information that will be encoded. Encryption extent should be diminished to decrease the trouble on calculation. Security Issues Cryptographic wellbeing recognizes whether encryption framework is ensured against savage power and different plaintext-figure content assault. For vital media program, it is truly critical that the encryption framework must meet cryptographic security which is surveyed in three levels as negligible, medium and high. Hence, from the above discussions it can be said that the work being presented by the authors has significant importance in the practical world with the emerging trends in digital communication. Presentation of the paper The overall presentation of the paper is good and well-written article with an important message for network administrators and organizations. Overall this article is very straightforward and easily understandable by the readers as it is well structured. This paper has been properly divided into different sections with appropriate headings and subheadings so that the readers can easily determine and get an overview of contents being presented in each section. Recommendations for improvement In order to have more people be engaged and read the whole article it needs a new, more concise introduction. Once the reader gets to the really good examples that are relevant to the everyday importance of Cryptography for ensuring data and network security, a major portion of the article is already gone. Hence, it is recommended that the beginning sections should not only include overview or description of the area but discussions have to be carried out with different examples so that the readers find it easy to understand purpose of the research. Further, an experimental investigation can be carried to provide accurate results on the value of various cryptographic algorithms that have been presented in the paper. The analysis of data is also an important aspect of any research paper which has not been included in this paper, so the inclusion of data analysis will help to achieve proper evaluation of the different cryptographic algorithms. Conclusion From the above discussion being carried out the search paper that has been chosen for this study, it can be concluded that overall presentation of the paper is good and well structured. The language being used while writing this paper is very simple to understand. So that even the readers without practical knowledge of computer security can be well aware of the role being played by cryptography to ensure security of data during transmission over network. The authors have presented in this paper that in this modern world of communication, cryptography is emerging as an important technology for security of networks. The critical review have been presented on the known cryptographic algorithms in a well-structured format to illustrate on the differences among the existing techniques for encryption. The authors have also stated that a good cryptography is that which stays for longer time year after year and a good cryptographic system is that which maintains balance in between the possib le and acceptable. Hence, it has been determined from the review on this particular chosen paper that there is a requirement for more considerable effort on this type of research to ensure secured communication References Acharya, K., Sajwan, M. and Bhargava, S., 2014. Analysis of Cryptographic Algorithms for Network Security.International Journal of Computer Applications Technology and Research,3(2), pp.130-135. Anandakumar, S., 2015. Image Cryptography Using RSA Algorithm in Network Security.International Journal of Computer Science Engineering Technology,5(9). Azad, S. and Pathan, A.S.K. eds., 2014.Practical Cryptography: Algorithms and Implementations Using C++. CRC Press. Babita, E. and Kaur, E.G., 2017. A Review: Network Security Based On Cryptography Steganography Techniques.International Journal,8(4). Bhatia, P. and Sumbaly, R., 2014. Framework for wireless network security using quantum cryptography.arXiv preprint arXiv:1412.2495. Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J. and Won, D., 2014. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.Sensors,14(6), pp.10081-10106. Devi, A., Sharma, A. and Rangra, A., 2015. A Review on DES, AES and Blowfish for Image Encryption Decryption.IJCSIT) International Journal of Computer Science and Information Technologies,6(3), pp.3034-3036. Devi, T.R., 2013, April. Importance of Cryptography in Network Security. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 462-467). IEEE. Ganeshkumar, K., Arivazhagan, D. and Sundaram, S., 2014. Advance cryptography algorithm for symmetric image encryption and decryption scheme for improving data security.Journal of Academia and Industrial Research,10(2), pp.563-6. Joshi, M.R. and Karkade, R.A., 2015. Network security with cryptography. International Journal of Computer Science and Mobile Computing IJCSMCVol, 4, pp.201-204. Kapoor, V. and Yadav, R., 2016. A Hybrid Cryptography Technique for Improving Network Security.International Journal of Computer Applications (09758887) Volume. Katz, J. and Lindell, Y., 2014.Introduction to modern cryptography. CRC press. Kumar, S.N., 2015. Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), pp.1-11. Mainanwal, V., Gupta, M. and Upadhayay, S.K., 2015, March. A survey on wireless body area network: Security technology and its design methodology issue. InInnovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on(pp. 1-5). IEEE. Mitali, V.K. and Sharma, A., 2014. A survey on various cryptography techniques.International Journal of Emerging Trends and Technology in Computer Science,3(4), p.6. Pachghare, V.K., 2015.Cryptography and information security. PHI Learning Pvt. Ltd.. Sagar, V. and Kumar, K., 2015, March. A symmetric key cryptography using genetic algorithm and error back propagation neural network. InComputing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on(pp. 1386-1391). IEEE. Sasi, S.B. and Sivanandam, N., 2015. A survey on cryptography using optimization algorithms in WSNs.Indian Journal of Science and Technology,8(3), pp.216-221. Sklavos, N., 2014. Book Review: Stallings, W. Cryptography and Network Security: Principles and Practice: Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690. Wasnik, T.P., Patil, V.S., Patinge, S.A., Dave, S.R. and Sayasikamal, G.J., 2013. Cryptography as an instrument to network security?.International Journal of Application or Innovation in Engineering Management (IJAIEM),2(3), pp.72-80.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.