Cryptography

Abstract

Network and Internet applications are becoming more and more popular every day, sensitive information requires security and safety measures. Security is the most difficult aspect of Internet and network applications. The encryption algorithm provides the necessary protection against hacker attacks by converting information from its normal form to an unreadable form. Most of the current web authentication is based on username / password. and password replacement is safer, but very difficult to use and expensive to deploy. Data security can be done using a technique called cryptography. Cryptography is therefore an evolving technology that is important for network security. In the past, national security cryptography was used to protect military information. However, use was limited. At present, the spectrum of cryptographic applications in the modern field has been considerably widened after the development of the means of communication; Cryptography is basically necessary to protect data from intrusion and prevent spying. Cryptography is an evolving technology that is important for network security. The study of cryptography is still in the development stage and considerable research is still needed for secure communication. This article describes the state of the art for a wide range of cryptographic algorithms used in network applications.

Country : India

1 Pranali Pund2 Yamini Bhele3 Prof. M.R.Khan

  1. PG Student, Final Year MCA, Department of MCA, Vidyabharti Mahavidayalaya, Amravati(M.S), India
  2. PG Student, Final Year MCA, Department of MCA, Vidyabharti Mahavidayalaya, Amravati(M.S), India
  3. Professor, Department of MCA, Vidyabharti Mahavidayalaya, Amravati(M.S), India

IRJIET, Volume 4, Issue 1, January 2020 pp. 32-37

References

  1. Aameer Nadeem, Dr. M.Younus Javed, A performance comparison   of   data   Encryption   Algorithm, Global Telecommunication Workshops, 2004 Globe Com Workshops 2004, IEEE.
  2. C. Herley, “So long, and no thanks for the externalities: the rational rejection of security advice by users,” in Proceedings of the workshop on New security paradigms workshop, 2009, pp.133–144.
  3. Computer Network Defense Course (CNDC), Army Reserve Readiness Training Center, Fort McCoy WI, http:/arrtc.mccoy.army.mil, Jan.2004.
  4. “How to improve JavaScript cryptography.” : http://hellais.wordpress.com/2011/12/27/how-to improve-javascript-cryptography/
  5. IETF, “RFC 5246 - The Transport LayerSecurity (TLS)
  6. Protocol Version 1.2.”.: http://tools.ietf.org/html/rfc5246
  7. Kyung Jun Choi, John –In Song, “Investigation of feasible cryptographic Algorithm For wireless sensor network”, International conference on ICACT Feb 20-22, 2006.
  8. K .Thogmas, "The Myth of the Skytale ". Taylor & Francis, (1998), Vol (33), pp:244-260.
  9. Like Zhang, Gregory B. White, Anomaly Detection for Application Level Network Attacks Using Payload Keywords, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA2007).
  10. Mohamed A.Haleem, Chetan N.Mathur, R.Chandramouli, K.P.Subbalakshmi, “Opportunistic Encryption: A tradeoff between Security and Throughput in Wireless Network” IEEE Transactions on Dependable and secure computing, vol. 4, no.4.
  11. Mozilla, Overview “of                NSS MDN: https://developer.mozilla.org/en-US/docs/Overview of_NSS.
  12. Matasano, “Javascript Cryptography Considered Harmful,” 2011: http://www.matasano.com/articles/javascript- cryptography/.