A Study Of Cryptography To Protect Data From Cyber-Crimes
1. Research Journal of Engineering and Technology. 11(2): April- June, 2020
45
ISSN 0976-2973 (Print)
2321-581X (Online)
DOI: 10.5958/2321-581X.2020.00008.2
Vol. 11 |Issue-02|
April- June| 2020
Available online at
www.anvpublication.org
Research Journal of
Engineering and Technology
Home page www.ijersonline.org
REVIEW ARTICLE
A Study of Cryptography to Protect Data from Cyber-crimes
Abhishek Guru1
, Asha Ambhikar2
1
Research Scholar, Computer Science Department, Kalinga University, Naya Raipur, Raipur, India.
2
Professor, Computer Science Depaprtment, Kalinga University, Naya Raipur, Raipur, India.
*Corresponding Author E-mail: abhishekguru0703@gmail.com, dr.asha.ambhaikar@gmail.com
ABSTRACT:
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an
offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a
day’s every information or data is digitalises which are stored in server, clouds and other resources. The more data
we store the more organized crime is ready to devour it. Now a day’s online lifestyle gives enormous opportunities
to reach anyone from anywhere but this gives chances to cyber-crime. Today to control cyber-crimes we having
lots of techniques, Cryptography is one of them. The Cryptography is an art of hiding data or information from
unauthorized users. The importance of cryptography to securing data or information and some major cyber-crimes
are studied through this research paper.
KEYWORDS: Cyber Security, Digitalization, Cryptography, Cyber-crime, Information.
I. INTRODUCTION:
In today’s modern world, information and communication technologies are omnipresent and digitalization in all areas
is expanding and the world of network today has become a parallel form of life and living. The use of internet is one
of the fastest growing areas of technical infrastructure development. The Cyber security is a state or a process of
protecting information and information system such as data base, computers, networks and data centres and some
applications with appropriate procedural and technological security measure. For data security we having lots of
technologies by which we can able to secure our data from unauthenticated user. Cyber security has appeared as an
erected discipline for infrastructure and computers with a focus on protection of information stored on systems from
those who want to obtain, corrupt, destroy or prohibit access to it. The cryptographic algorithms plays very impotent
role to secure the data over the network. There are many cryptographic algorithms are available to secure the data or
information over the network. In cryptography the original message is converted in the unreadable form which is
called cipher text and the original message is called plaintext.
A. Cryptography:
Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping the
message. To keep information secret a widely used method is encryption and decryption which are the basic function
of Cryptography. In cryptography the information is converted into unreadable format which is ciphertext or
cyphertext which is cannot be understand by unauthorized user only a person who having a key can able to decode
the information into original format which is called plaintext.
As we know that in the main goal of cyber security is securing the information and data from unauthenticated users.
To secure the information or data we having cryptographic algorithms which are help to encrypt the data.
2. Research Journal of Engineering and Technology. 11(2): April- June, 2020
46
Figure 1: Cryptography
As we can see the figure in cryptography first the plaintext (original message) is converted into unreadable format by
using encryption algorithm and key and the data is transferred to network in other hand the receiver uses the decryption
algorithm and private key to get the original message.
Classification of Cryptography:
Encryption algorithms can be classified into two categories- Symmetric and Asymmetric key encryption.
i. Symmetric Algorithm
ii. Asymmetric Algorithm
Figure 2: Classification of Cryptography
• Symmetric Algorithm:
In the symmetric key encryption, same key is used for encryption and decryption both. Symmetric key cryptosystems
are faster than the asymmetric key cryptosystems. It is used to provide confidentiality of the messages. There are
hundreds of different symmetric key algorithms available. Each has its own strengths and weaknesses. Some of the
more common examples are DES, 3DES, AES, IDEA, RC4, and RC5.
1. DES (Data Encryption Standard):
DES was originally developed in 1976. It has been one of the most widely used encryption algorithms. This is partially
due to the fact that it was adopted as the government standard for encryption. The DES algorithm itself is very strong.
The weakness of the original DES standard is that it uses a 56-bit encryption key.
2. 3DES:
It is most commonly known as Triple DES. It applies the DES algorithm three times to each block of data that's why
it's called 3DES. 3DES has overtaken its predecessor, DES, and is currently considered to be the most widely used
standard for secure encryption. The algorithm itself is just as strong as DES and also has the advantage of being able
to use longer key lengths. A key must be specified for each of the 3DES encryption. There is an option of using the
same key for each, the same for two of the iterations, or a different key for each of the iterations. The most secure
implementation is to use a different key for each iteration. If you use the same key for all three iterations, the key
strength is considered to be 56 bits. That's basically the same as DES.
3. AES (Advanced Encryption Standard):
It is also sometimes referred to as the Rijndael algorithm. This is due to the fact that AES actually comes from the
Rijndael algorithm. The Rijndael algorithm was chosen as AES standard by the evaluation of the government. The
AES standard have three different ciphers: AES-128, AES-192, and AES-256. The numbers represent the length of
the encryption key. AES is very fast and very secure. Because of this, its global uptake has been very quick.
4. IDEA (International Data Encryption Algorithm):
It is the International Data Encryption Algorithm. IDEA was originally a replacement for the DES standard. IDEA
uses a 128-bit encryption key. There are two main factor IDEA is not as widely used. The first is the fact that IDEA
is subject to a range of weak keys. The second reason is that there are currently faster algorithms that produce the
same level of security.
3. Research Journal of Engineering and Technology. 11(2): April- June, 2020
47
❖ Asymmetric Algorithm:
In the asymmetric cryptography a key can be divided into two parts, a public key and a private key. The public key
can be available for everyone while the private key must be kept secret. Asymmetric cryptography has two major use
cases: confidentiality and authentication. Using asymmetric cryptography, messages signed with a private key, and
then anyone with the public key is able to verify that the message was created by someone possessing the
corresponding private key. This can be combined with a proof of identity system to know what entity (person or group)
actually owns that private key, providing authentication. Encryption with asymmetric cryptography works in different
way from symmetric encryption. Asymmetric key algorithms aren't as widely used as symmetric counterparts. So we'll
go over two of the big ones: Diffie-Hellman and RSA.
1. Diffie-Hellman:
The Diffie-Hellman algorithm was one of the earliest known asymmetric key implementations. The Diffie-Hellman
algorithm is mostly used for key exchange. Although symmetric key algorithms are fast and secure, key exchange is
always a problem. You have to figure out a way to get the private key to all systems. The Diffie-Hellman algorithm
helps with this. The Diffie-Hellman algorithm was used to establish a secure communication channel used by the
systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
2. RSA ( Rivest Shamir Adelman algorithm):
RSA was developed in 1978. RSA was the first widely used asymmetric algorithms used for signing and encryption.
It supports key lengths of 768 and 1,024 bits. The RSA algorithm uses a three-part process. The first part is key
generation. The keys used in the RSA algorithm are based on prime numbers. The second part of the process is
encryption. This encryption is done using public key and private key pair. The third part of the process is decryption.
The decryption is done using the private key.
Cyber security is protecting devices from unauthorized access. It is an important matter for the Internet and the systems
built on it. Cyber warfare and cyber-crime have prevalent and potentially devastating effects. The benefits of
collaboration can get through the risk of loss of privacy, wealth, and personal security.
A cyber-attack example is hack where an intruder steals valuable data such as credit card information, or intellectual
property. Another example is a distributed denial-of-service attack where the attacker compromises a target by
flooding it with requests from multiple systems.
Types of Cyber-crime:
Cyber-crimes can be of the following types:
A. Hacking- It is a type of crime in which the personal data is accessed by criminals by using some applications or
codes. Hacking is done to access the personal, confidential and sensitive information from an individual’s computer.
It can also be done to change the passwords of login accounts and use the information against them.
B. Theft- Under this category a person violates or breaks the copyrights of a particular website and download songs,
games, movies and software. There are many websites which allow downloading the data that is copied from other
websites. It is known as pirated data as the quality of data is not up to the mark.
C. Identity theft- In this attack, criminals steal data about person’s bank account number, credit card number, debit
card and other confidential data to transfer money to his account or buy things online by acting as the original person
i.e. the criminal stalks the identity of person and thus it is known as identity theft. This theft can result in huge
economical loss to the victim.
D. Defamation- In this type of crime, the criminal hacks the email account of a person and sends mails using abusive
languages to known person’s mail accounts so as to lower the dignity or fame of that person.
E. Malicious software- These are the software that is used to access the system to steal confidential data of the
organization or can be used to damage the hardware and software of the system.
F. Cyber Stalking- It is a type of attack where online messages and e-mails are bombarded on victim’s system. In
cyber staking, internet is used to harass an individual, group or organization by using defamation, identity theft,
solicitation for sex, false accusations etc.
G. E-mail harassment- In this type of cyber-crime, the victim is harassed by receiving letters, attachments in files
and folders of e-mails.
H. Spoofing- It is a type of situation in which criminal masquerade as another person i.e. the criminal acts as another
person by using his identity and therefore takes advantage of illegally accessing data of the other person.
I. Virus- It is a small program that is loaded on the victim’s computer without his knowledge which causes a large
amount of damage to the system. Viruses attach themselves to files and circulate themselves to other files on the
network which leads to damage of the system.
J. Phishing- It is an attack in which criminal sends genuine looking emails to victim to gather personal and financial
information of the victim which can be used against him.