SlideShare a Scribd company logo
1 of 4
Download to read offline
Research Journal of Engineering and Technology. 11(2): April- June, 2020
45
ISSN 0976-2973 (Print)
2321-581X (Online)
DOI: 10.5958/2321-581X.2020.00008.2
Vol. 11 |Issue-02|
April- June| 2020
Available online at
www.anvpublication.org
Research Journal of
Engineering and Technology
Home page www.ijersonline.org
REVIEW ARTICLE
A Study of Cryptography to Protect Data from Cyber-crimes
Abhishek Guru1
, Asha Ambhikar2
1
Research Scholar, Computer Science Department, Kalinga University, Naya Raipur, Raipur, India.
2
Professor, Computer Science Depaprtment, Kalinga University, Naya Raipur, Raipur, India.
*Corresponding Author E-mail: abhishekguru0703@gmail.com, dr.asha.ambhaikar@gmail.com
ABSTRACT:
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an
offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a
day’s every information or data is digitalises which are stored in server, clouds and other resources. The more data
we store the more organized crime is ready to devour it. Now a day’s online lifestyle gives enormous opportunities
to reach anyone from anywhere but this gives chances to cyber-crime. Today to control cyber-crimes we having
lots of techniques, Cryptography is one of them. The Cryptography is an art of hiding data or information from
unauthorized users. The importance of cryptography to securing data or information and some major cyber-crimes
are studied through this research paper.
KEYWORDS: Cyber Security, Digitalization, Cryptography, Cyber-crime, Information.
I. INTRODUCTION:
In today’s modern world, information and communication technologies are omnipresent and digitalization in all areas
is expanding and the world of network today has become a parallel form of life and living. The use of internet is one
of the fastest growing areas of technical infrastructure development. The Cyber security is a state or a process of
protecting information and information system such as data base, computers, networks and data centres and some
applications with appropriate procedural and technological security measure. For data security we having lots of
technologies by which we can able to secure our data from unauthenticated user. Cyber security has appeared as an
erected discipline for infrastructure and computers with a focus on protection of information stored on systems from
those who want to obtain, corrupt, destroy or prohibit access to it. The cryptographic algorithms plays very impotent
role to secure the data over the network. There are many cryptographic algorithms are available to secure the data or
information over the network. In cryptography the original message is converted in the unreadable form which is
called cipher text and the original message is called plaintext.
A. Cryptography:
Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping the
message. To keep information secret a widely used method is encryption and decryption which are the basic function
of Cryptography. In cryptography the information is converted into unreadable format which is ciphertext or
cyphertext which is cannot be understand by unauthorized user only a person who having a key can able to decode
the information into original format which is called plaintext.
As we know that in the main goal of cyber security is securing the information and data from unauthenticated users.
To secure the information or data we having cryptographic algorithms which are help to encrypt the data.
Research Journal of Engineering and Technology. 11(2): April- June, 2020
46
Figure 1: Cryptography
As we can see the figure in cryptography first the plaintext (original message) is converted into unreadable format by
using encryption algorithm and key and the data is transferred to network in other hand the receiver uses the decryption
algorithm and private key to get the original message.
Classification of Cryptography:
Encryption algorithms can be classified into two categories- Symmetric and Asymmetric key encryption.
i. Symmetric Algorithm
ii. Asymmetric Algorithm
Figure 2: Classification of Cryptography
• Symmetric Algorithm:
In the symmetric key encryption, same key is used for encryption and decryption both. Symmetric key cryptosystems
are faster than the asymmetric key cryptosystems. It is used to provide confidentiality of the messages. There are
hundreds of different symmetric key algorithms available. Each has its own strengths and weaknesses. Some of the
more common examples are DES, 3DES, AES, IDEA, RC4, and RC5.
1. DES (Data Encryption Standard):
DES was originally developed in 1976. It has been one of the most widely used encryption algorithms. This is partially
due to the fact that it was adopted as the government standard for encryption. The DES algorithm itself is very strong.
The weakness of the original DES standard is that it uses a 56-bit encryption key.
2. 3DES:
It is most commonly known as Triple DES. It applies the DES algorithm three times to each block of data that's why
it's called 3DES. 3DES has overtaken its predecessor, DES, and is currently considered to be the most widely used
standard for secure encryption. The algorithm itself is just as strong as DES and also has the advantage of being able
to use longer key lengths. A key must be specified for each of the 3DES encryption. There is an option of using the
same key for each, the same for two of the iterations, or a different key for each of the iterations. The most secure
implementation is to use a different key for each iteration. If you use the same key for all three iterations, the key
strength is considered to be 56 bits. That's basically the same as DES.
3. AES (Advanced Encryption Standard):
It is also sometimes referred to as the Rijndael algorithm. This is due to the fact that AES actually comes from the
Rijndael algorithm. The Rijndael algorithm was chosen as AES standard by the evaluation of the government. The
AES standard have three different ciphers: AES-128, AES-192, and AES-256. The numbers represent the length of
the encryption key. AES is very fast and very secure. Because of this, its global uptake has been very quick.
4. IDEA (International Data Encryption Algorithm):
It is the International Data Encryption Algorithm. IDEA was originally a replacement for the DES standard. IDEA
uses a 128-bit encryption key. There are two main factor IDEA is not as widely used. The first is the fact that IDEA
is subject to a range of weak keys. The second reason is that there are currently faster algorithms that produce the
same level of security.
Research Journal of Engineering and Technology. 11(2): April- June, 2020
47
❖ Asymmetric Algorithm:
In the asymmetric cryptography a key can be divided into two parts, a public key and a private key. The public key
can be available for everyone while the private key must be kept secret. Asymmetric cryptography has two major use
cases: confidentiality and authentication. Using asymmetric cryptography, messages signed with a private key, and
then anyone with the public key is able to verify that the message was created by someone possessing the
corresponding private key. This can be combined with a proof of identity system to know what entity (person or group)
actually owns that private key, providing authentication. Encryption with asymmetric cryptography works in different
way from symmetric encryption. Asymmetric key algorithms aren't as widely used as symmetric counterparts. So we'll
go over two of the big ones: Diffie-Hellman and RSA.
1. Diffie-Hellman:
The Diffie-Hellman algorithm was one of the earliest known asymmetric key implementations. The Diffie-Hellman
algorithm is mostly used for key exchange. Although symmetric key algorithms are fast and secure, key exchange is
always a problem. You have to figure out a way to get the private key to all systems. The Diffie-Hellman algorithm
helps with this. The Diffie-Hellman algorithm was used to establish a secure communication channel used by the
systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
2. RSA ( Rivest Shamir Adelman algorithm):
RSA was developed in 1978. RSA was the first widely used asymmetric algorithms used for signing and encryption.
It supports key lengths of 768 and 1,024 bits. The RSA algorithm uses a three-part process. The first part is key
generation. The keys used in the RSA algorithm are based on prime numbers. The second part of the process is
encryption. This encryption is done using public key and private key pair. The third part of the process is decryption.
The decryption is done using the private key.
Cyber security is protecting devices from unauthorized access. It is an important matter for the Internet and the systems
built on it. Cyber warfare and cyber-crime have prevalent and potentially devastating effects. The benefits of
collaboration can get through the risk of loss of privacy, wealth, and personal security.
A cyber-attack example is hack where an intruder steals valuable data such as credit card information, or intellectual
property. Another example is a distributed denial-of-service attack where the attacker compromises a target by
flooding it with requests from multiple systems.
Types of Cyber-crime:
Cyber-crimes can be of the following types:
A. Hacking- It is a type of crime in which the personal data is accessed by criminals by using some applications or
codes. Hacking is done to access the personal, confidential and sensitive information from an individual’s computer.
It can also be done to change the passwords of login accounts and use the information against them.
B. Theft- Under this category a person violates or breaks the copyrights of a particular website and download songs,
games, movies and software. There are many websites which allow downloading the data that is copied from other
websites. It is known as pirated data as the quality of data is not up to the mark.
C. Identity theft- In this attack, criminals steal data about person’s bank account number, credit card number, debit
card and other confidential data to transfer money to his account or buy things online by acting as the original person
i.e. the criminal stalks the identity of person and thus it is known as identity theft. This theft can result in huge
economical loss to the victim.
D. Defamation- In this type of crime, the criminal hacks the email account of a person and sends mails using abusive
languages to known person’s mail accounts so as to lower the dignity or fame of that person.
E. Malicious software- These are the software that is used to access the system to steal confidential data of the
organization or can be used to damage the hardware and software of the system.
F. Cyber Stalking- It is a type of attack where online messages and e-mails are bombarded on victim’s system. In
cyber staking, internet is used to harass an individual, group or organization by using defamation, identity theft,
solicitation for sex, false accusations etc.
G. E-mail harassment- In this type of cyber-crime, the victim is harassed by receiving letters, attachments in files
and folders of e-mails.
H. Spoofing- It is a type of situation in which criminal masquerade as another person i.e. the criminal acts as another
person by using his identity and therefore takes advantage of illegally accessing data of the other person.
I. Virus- It is a small program that is loaded on the victim’s computer without his knowledge which causes a large
amount of damage to the system. Viruses attach themselves to files and circulate themselves to other files on the
network which leads to damage of the system.
J. Phishing- It is an attack in which criminal sends genuine looking emails to victim to gather personal and financial
information of the victim which can be used against him.
Research Journal of Engineering and Technology. 11(2): April- June, 2020
48
K. Grooming-Grooming is the process of influencing the youth emotionally for sexual exploitation. In this process,
criminal wins the trust of victim and then attempts to sexualize the relation between them which leads to pornography
or sex trafficking.
Among the various crimes prevailing in today’s society; cybercrime has become very common as well as very
dangerous. The emergence of new technology has increased the number of perpetrators that take advantage of these
resources to use them illegally for their own gain. Online fraud and hacking attacks are just some examples of
computer-related crimes that are committed on a large scale every day. Hence the awareness of cybercrime as well as
cyber security is very much needed for the learners and also for the teachers. There is dearth of such studies which try
to study the level of cybercrime awareness. So, the present investigation visualized a need to study level of cybercrime
awareness among students and this paper elucidates the awareness of students towards cybercrime.
A major contributor to cyber penetrability is that many computer systems and software applications were not designed
with enough attention to security. For instance, the Domain Name System was not designed to be completely secure.
To implementing cyber security the main components are software, hardware, and human. Humans must implement
policies such as using strong passwords and not unfold them; software must be kept up to date with patches that fix
its permeability’s. Antivirus software and firewalls can help prevent unauthorized access to private data.
Cryptography is essential to many models of cyber security. Cryptography applies algorithms to shuffle the bits that
represent data in such a way that only authorized users can unshuffle them to obtain the original data. Cryptographic
algorithms use mathematics to achieve effective shuffling. Most common cryptographic standards are open where the
algorithms are known and published, but the clever mathematics makes it impractical to decode the shuffled bits. Open
standards help ensure cryptography is secure. Symmetric encryption is a method of encryption involving the same key
for both encryption and decryption. Public key encryption, which is not symmetric, is an encryption method that is
widely used because of the enhanced security associated with its use. Certificate authorities issue digital certificates
that validate the ownership of encrypted keys used in secured communication and are based on a trust model.
CONCLUSION:
With the increase in the users of internet, the increase in cyber-crimes can also be seen. Cyber-crime can be done
mainly by using the technique of hacking. Hacking is the method in which the criminals get access to the victim’s
system without their knowledge. All the persons who use internet and especially those make money transactions
through internet must be beware of the cyber criminals. It is the need of today’s world to have knowledge about the
crimes that are associated with the internet. It is the duty of each one of us to be aware of the basic internet security
like changing the passwords regularly, keeping long passwords, avoids disclosing personal information to strangers
on the internet or entering credit card details on unsecured websites to avoid any fraud, etc. Government is also making
efforts to have a control on these cyber-crimes. IT Act 2000 is made to deal with the cyber-crimes.
REFERENCES:
1. A. A. Cardenas, P. K. Manadhata, S. P. Rajan, Big Data Analytics for Security, IEEE Security and Privacy, 11 (6), 2013, pp. 74 -76.
2. Enhancing Cyber security with Big Data: Challenges and Opportunities December 2, 2016 by Emmeline Short.
3. Elisa Bertino, E. (2014). Security with Privacy -Opportunities and Challenges.
4. http://www.villanovau.com/resources/bi/for-cyber-security-big-data-offers-advantages-challenges Accessed on 20 February 2018
5. Omar G. Abood, Shawkat K.Guirguis,(2018), A Survey on Cryptography Algorithm, International Journal of Science and Research
Publications, Volume:8, Issue:7, ISSN: 2250-3153.
6. B, Padmavathi, S. Ranjita Kumari, (2013), A Survey on Performance Analysis of DES,AES and RSA Algorithm along with LSB Substitution
Technique, International Journal of Science and Research”, Volume:2, Issue:4, ISSN: 2319-7064.
7. Gurpreet Singh, Supriya, (2013), A Study of Encryption Algorithms (RSA,DES,3DES and AES)for Information Security, International Journal
of Computer Application, Volume:67, Issue: 19, ISSN: 0975-8887.
8. Z. Spalevic, Cyber security as a global challenge today, Singidunum Journal of Applied Sciences, 2014, pp. 687 -692.
9. Solving Cyber Security Challenges using Big Data, Prajakta Joglekar, Nitin Pise, International Journal of Computer Applications (0975–
8887)Volume 154–No.4, November 2016
Received on 21.05.2020 Accepted on 19.06.2020
©A&V Publications all right reserved
Research J. Engineering and Tech. 2020;11(2):45-48.
DOI: 10.5958/2321-581X.2020.00008.2

More Related Content

Similar to A Study Of Cryptography To Protect Data From Cyber-Crimes

Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 

Similar to A Study Of Cryptography To Protect Data From Cyber-Crimes (20)

Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
N45028390
N45028390N45028390
N45028390
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
security issue
security issuesecurity issue
security issue
 
s117
s117s117
s117
 

More from Joe Osborn

Research Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short ResearResearch Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short ResearJoe Osborn
 
Narrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP EduNarrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP EduJoe Osborn
 
Fantastic College Admissions Essay Help
Fantastic College Admissions Essay HelpFantastic College Admissions Essay Help
Fantastic College Admissions Essay HelpJoe Osborn
 
College Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay ExaCollege Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay ExaJoe Osborn
 
Professional Paper Writing
Professional Paper WritingProfessional Paper Writing
Professional Paper WritingJoe Osborn
 
Consumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 MustangConsumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 MustangJoe Osborn
 
College Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should CollegeCollege Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should CollegeJoe Osborn
 
Edit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading ServiceEdit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading ServiceJoe Osborn
 
Academic Writing CELC E-Resources
Academic Writing CELC E-ResourcesAcademic Writing CELC E-Resources
Academic Writing CELC E-ResourcesJoe Osborn
 
Patriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher CreatePatriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher CreateJoe Osborn
 
Quality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For StudenQuality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For StudenJoe Osborn
 
Scholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A TelScholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A TelJoe Osborn
 
An Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The FollowingAn Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The FollowingJoe Osborn
 
General Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 MasGeneral Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 MasJoe Osborn
 
21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read When21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read WhenJoe Osborn
 
Film Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis EssaFilm Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis EssaJoe Osborn
 
White Writing On Black Background Cotton F
White Writing On Black Background Cotton FWhite Writing On Black Background Cotton F
White Writing On Black Background Cotton FJoe Osborn
 
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...Joe Osborn
 
A Glance To Teachers Work With Resources Case Of Olcay
A Glance To Teachers  Work With Resources  Case Of OlcayA Glance To Teachers  Work With Resources  Case Of Olcay
A Glance To Teachers Work With Resources Case Of OlcayJoe Osborn
 
3G RBS Overview Field Support Operations Contents
3G RBS Overview Field Support   Operations Contents3G RBS Overview Field Support   Operations Contents
3G RBS Overview Field Support Operations ContentsJoe Osborn
 

More from Joe Osborn (20)

Research Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short ResearResearch Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short Resear
 
Narrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP EduNarrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP Edu
 
Fantastic College Admissions Essay Help
Fantastic College Admissions Essay HelpFantastic College Admissions Essay Help
Fantastic College Admissions Essay Help
 
College Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay ExaCollege Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay Exa
 
Professional Paper Writing
Professional Paper WritingProfessional Paper Writing
Professional Paper Writing
 
Consumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 MustangConsumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 Mustang
 
College Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should CollegeCollege Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should College
 
Edit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading ServiceEdit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading Service
 
Academic Writing CELC E-Resources
Academic Writing CELC E-ResourcesAcademic Writing CELC E-Resources
Academic Writing CELC E-Resources
 
Patriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher CreatePatriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher Create
 
Quality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For StudenQuality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For Studen
 
Scholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A TelScholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A Tel
 
An Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The FollowingAn Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The Following
 
General Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 MasGeneral Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 Mas
 
21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read When21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read When
 
Film Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis EssaFilm Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis Essa
 
White Writing On Black Background Cotton F
White Writing On Black Background Cotton FWhite Writing On Black Background Cotton F
White Writing On Black Background Cotton F
 
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
 
A Glance To Teachers Work With Resources Case Of Olcay
A Glance To Teachers  Work With Resources  Case Of OlcayA Glance To Teachers  Work With Resources  Case Of Olcay
A Glance To Teachers Work With Resources Case Of Olcay
 
3G RBS Overview Field Support Operations Contents
3G RBS Overview Field Support   Operations Contents3G RBS Overview Field Support   Operations Contents
3G RBS Overview Field Support Operations Contents
 

Recently uploaded

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 

Recently uploaded (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 

A Study Of Cryptography To Protect Data From Cyber-Crimes

  • 1. Research Journal of Engineering and Technology. 11(2): April- June, 2020 45 ISSN 0976-2973 (Print) 2321-581X (Online) DOI: 10.5958/2321-581X.2020.00008.2 Vol. 11 |Issue-02| April- June| 2020 Available online at www.anvpublication.org Research Journal of Engineering and Technology Home page www.ijersonline.org REVIEW ARTICLE A Study of Cryptography to Protect Data from Cyber-crimes Abhishek Guru1 , Asha Ambhikar2 1 Research Scholar, Computer Science Department, Kalinga University, Naya Raipur, Raipur, India. 2 Professor, Computer Science Depaprtment, Kalinga University, Naya Raipur, Raipur, India. *Corresponding Author E-mail: abhishekguru0703@gmail.com, dr.asha.ambhaikar@gmail.com ABSTRACT: Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a day’s every information or data is digitalises which are stored in server, clouds and other resources. The more data we store the more organized crime is ready to devour it. Now a day’s online lifestyle gives enormous opportunities to reach anyone from anywhere but this gives chances to cyber-crime. Today to control cyber-crimes we having lots of techniques, Cryptography is one of them. The Cryptography is an art of hiding data or information from unauthorized users. The importance of cryptography to securing data or information and some major cyber-crimes are studied through this research paper. KEYWORDS: Cyber Security, Digitalization, Cryptography, Cyber-crime, Information. I. INTRODUCTION: In today’s modern world, information and communication technologies are omnipresent and digitalization in all areas is expanding and the world of network today has become a parallel form of life and living. The use of internet is one of the fastest growing areas of technical infrastructure development. The Cyber security is a state or a process of protecting information and information system such as data base, computers, networks and data centres and some applications with appropriate procedural and technological security measure. For data security we having lots of technologies by which we can able to secure our data from unauthenticated user. Cyber security has appeared as an erected discipline for infrastructure and computers with a focus on protection of information stored on systems from those who want to obtain, corrupt, destroy or prohibit access to it. The cryptographic algorithms plays very impotent role to secure the data over the network. There are many cryptographic algorithms are available to secure the data or information over the network. In cryptography the original message is converted in the unreadable form which is called cipher text and the original message is called plaintext. A. Cryptography: Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping the message. To keep information secret a widely used method is encryption and decryption which are the basic function of Cryptography. In cryptography the information is converted into unreadable format which is ciphertext or cyphertext which is cannot be understand by unauthorized user only a person who having a key can able to decode the information into original format which is called plaintext. As we know that in the main goal of cyber security is securing the information and data from unauthenticated users. To secure the information or data we having cryptographic algorithms which are help to encrypt the data.
  • 2. Research Journal of Engineering and Technology. 11(2): April- June, 2020 46 Figure 1: Cryptography As we can see the figure in cryptography first the plaintext (original message) is converted into unreadable format by using encryption algorithm and key and the data is transferred to network in other hand the receiver uses the decryption algorithm and private key to get the original message. Classification of Cryptography: Encryption algorithms can be classified into two categories- Symmetric and Asymmetric key encryption. i. Symmetric Algorithm ii. Asymmetric Algorithm Figure 2: Classification of Cryptography • Symmetric Algorithm: In the symmetric key encryption, same key is used for encryption and decryption both. Symmetric key cryptosystems are faster than the asymmetric key cryptosystems. It is used to provide confidentiality of the messages. There are hundreds of different symmetric key algorithms available. Each has its own strengths and weaknesses. Some of the more common examples are DES, 3DES, AES, IDEA, RC4, and RC5. 1. DES (Data Encryption Standard): DES was originally developed in 1976. It has been one of the most widely used encryption algorithms. This is partially due to the fact that it was adopted as the government standard for encryption. The DES algorithm itself is very strong. The weakness of the original DES standard is that it uses a 56-bit encryption key. 2. 3DES: It is most commonly known as Triple DES. It applies the DES algorithm three times to each block of data that's why it's called 3DES. 3DES has overtaken its predecessor, DES, and is currently considered to be the most widely used standard for secure encryption. The algorithm itself is just as strong as DES and also has the advantage of being able to use longer key lengths. A key must be specified for each of the 3DES encryption. There is an option of using the same key for each, the same for two of the iterations, or a different key for each of the iterations. The most secure implementation is to use a different key for each iteration. If you use the same key for all three iterations, the key strength is considered to be 56 bits. That's basically the same as DES. 3. AES (Advanced Encryption Standard): It is also sometimes referred to as the Rijndael algorithm. This is due to the fact that AES actually comes from the Rijndael algorithm. The Rijndael algorithm was chosen as AES standard by the evaluation of the government. The AES standard have three different ciphers: AES-128, AES-192, and AES-256. The numbers represent the length of the encryption key. AES is very fast and very secure. Because of this, its global uptake has been very quick. 4. IDEA (International Data Encryption Algorithm): It is the International Data Encryption Algorithm. IDEA was originally a replacement for the DES standard. IDEA uses a 128-bit encryption key. There are two main factor IDEA is not as widely used. The first is the fact that IDEA is subject to a range of weak keys. The second reason is that there are currently faster algorithms that produce the same level of security.
  • 3. Research Journal of Engineering and Technology. 11(2): April- June, 2020 47 ❖ Asymmetric Algorithm: In the asymmetric cryptography a key can be divided into two parts, a public key and a private key. The public key can be available for everyone while the private key must be kept secret. Asymmetric cryptography has two major use cases: confidentiality and authentication. Using asymmetric cryptography, messages signed with a private key, and then anyone with the public key is able to verify that the message was created by someone possessing the corresponding private key. This can be combined with a proof of identity system to know what entity (person or group) actually owns that private key, providing authentication. Encryption with asymmetric cryptography works in different way from symmetric encryption. Asymmetric key algorithms aren't as widely used as symmetric counterparts. So we'll go over two of the big ones: Diffie-Hellman and RSA. 1. Diffie-Hellman: The Diffie-Hellman algorithm was one of the earliest known asymmetric key implementations. The Diffie-Hellman algorithm is mostly used for key exchange. Although symmetric key algorithms are fast and secure, key exchange is always a problem. You have to figure out a way to get the private key to all systems. The Diffie-Hellman algorithm helps with this. The Diffie-Hellman algorithm was used to establish a secure communication channel used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems. 2. RSA ( Rivest Shamir Adelman algorithm): RSA was developed in 1978. RSA was the first widely used asymmetric algorithms used for signing and encryption. It supports key lengths of 768 and 1,024 bits. The RSA algorithm uses a three-part process. The first part is key generation. The keys used in the RSA algorithm are based on prime numbers. The second part of the process is encryption. This encryption is done using public key and private key pair. The third part of the process is decryption. The decryption is done using the private key. Cyber security is protecting devices from unauthorized access. It is an important matter for the Internet and the systems built on it. Cyber warfare and cyber-crime have prevalent and potentially devastating effects. The benefits of collaboration can get through the risk of loss of privacy, wealth, and personal security. A cyber-attack example is hack where an intruder steals valuable data such as credit card information, or intellectual property. Another example is a distributed denial-of-service attack where the attacker compromises a target by flooding it with requests from multiple systems. Types of Cyber-crime: Cyber-crimes can be of the following types: A. Hacking- It is a type of crime in which the personal data is accessed by criminals by using some applications or codes. Hacking is done to access the personal, confidential and sensitive information from an individual’s computer. It can also be done to change the passwords of login accounts and use the information against them. B. Theft- Under this category a person violates or breaks the copyrights of a particular website and download songs, games, movies and software. There are many websites which allow downloading the data that is copied from other websites. It is known as pirated data as the quality of data is not up to the mark. C. Identity theft- In this attack, criminals steal data about person’s bank account number, credit card number, debit card and other confidential data to transfer money to his account or buy things online by acting as the original person i.e. the criminal stalks the identity of person and thus it is known as identity theft. This theft can result in huge economical loss to the victim. D. Defamation- In this type of crime, the criminal hacks the email account of a person and sends mails using abusive languages to known person’s mail accounts so as to lower the dignity or fame of that person. E. Malicious software- These are the software that is used to access the system to steal confidential data of the organization or can be used to damage the hardware and software of the system. F. Cyber Stalking- It is a type of attack where online messages and e-mails are bombarded on victim’s system. In cyber staking, internet is used to harass an individual, group or organization by using defamation, identity theft, solicitation for sex, false accusations etc. G. E-mail harassment- In this type of cyber-crime, the victim is harassed by receiving letters, attachments in files and folders of e-mails. H. Spoofing- It is a type of situation in which criminal masquerade as another person i.e. the criminal acts as another person by using his identity and therefore takes advantage of illegally accessing data of the other person. I. Virus- It is a small program that is loaded on the victim’s computer without his knowledge which causes a large amount of damage to the system. Viruses attach themselves to files and circulate themselves to other files on the network which leads to damage of the system. J. Phishing- It is an attack in which criminal sends genuine looking emails to victim to gather personal and financial information of the victim which can be used against him.
  • 4. Research Journal of Engineering and Technology. 11(2): April- June, 2020 48 K. Grooming-Grooming is the process of influencing the youth emotionally for sexual exploitation. In this process, criminal wins the trust of victim and then attempts to sexualize the relation between them which leads to pornography or sex trafficking. Among the various crimes prevailing in today’s society; cybercrime has become very common as well as very dangerous. The emergence of new technology has increased the number of perpetrators that take advantage of these resources to use them illegally for their own gain. Online fraud and hacking attacks are just some examples of computer-related crimes that are committed on a large scale every day. Hence the awareness of cybercrime as well as cyber security is very much needed for the learners and also for the teachers. There is dearth of such studies which try to study the level of cybercrime awareness. So, the present investigation visualized a need to study level of cybercrime awareness among students and this paper elucidates the awareness of students towards cybercrime. A major contributor to cyber penetrability is that many computer systems and software applications were not designed with enough attention to security. For instance, the Domain Name System was not designed to be completely secure. To implementing cyber security the main components are software, hardware, and human. Humans must implement policies such as using strong passwords and not unfold them; software must be kept up to date with patches that fix its permeability’s. Antivirus software and firewalls can help prevent unauthorized access to private data. Cryptography is essential to many models of cyber security. Cryptography applies algorithms to shuffle the bits that represent data in such a way that only authorized users can unshuffle them to obtain the original data. Cryptographic algorithms use mathematics to achieve effective shuffling. Most common cryptographic standards are open where the algorithms are known and published, but the clever mathematics makes it impractical to decode the shuffled bits. Open standards help ensure cryptography is secure. Symmetric encryption is a method of encryption involving the same key for both encryption and decryption. Public key encryption, which is not symmetric, is an encryption method that is widely used because of the enhanced security associated with its use. Certificate authorities issue digital certificates that validate the ownership of encrypted keys used in secured communication and are based on a trust model. CONCLUSION: With the increase in the users of internet, the increase in cyber-crimes can also be seen. Cyber-crime can be done mainly by using the technique of hacking. Hacking is the method in which the criminals get access to the victim’s system without their knowledge. All the persons who use internet and especially those make money transactions through internet must be beware of the cyber criminals. It is the need of today’s world to have knowledge about the crimes that are associated with the internet. It is the duty of each one of us to be aware of the basic internet security like changing the passwords regularly, keeping long passwords, avoids disclosing personal information to strangers on the internet or entering credit card details on unsecured websites to avoid any fraud, etc. Government is also making efforts to have a control on these cyber-crimes. IT Act 2000 is made to deal with the cyber-crimes. REFERENCES: 1. A. A. Cardenas, P. K. Manadhata, S. P. Rajan, Big Data Analytics for Security, IEEE Security and Privacy, 11 (6), 2013, pp. 74 -76. 2. Enhancing Cyber security with Big Data: Challenges and Opportunities December 2, 2016 by Emmeline Short. 3. Elisa Bertino, E. (2014). Security with Privacy -Opportunities and Challenges. 4. http://www.villanovau.com/resources/bi/for-cyber-security-big-data-offers-advantages-challenges Accessed on 20 February 2018 5. Omar G. Abood, Shawkat K.Guirguis,(2018), A Survey on Cryptography Algorithm, International Journal of Science and Research Publications, Volume:8, Issue:7, ISSN: 2250-3153. 6. B, Padmavathi, S. Ranjita Kumari, (2013), A Survey on Performance Analysis of DES,AES and RSA Algorithm along with LSB Substitution Technique, International Journal of Science and Research”, Volume:2, Issue:4, ISSN: 2319-7064. 7. Gurpreet Singh, Supriya, (2013), A Study of Encryption Algorithms (RSA,DES,3DES and AES)for Information Security, International Journal of Computer Application, Volume:67, Issue: 19, ISSN: 0975-8887. 8. Z. Spalevic, Cyber security as a global challenge today, Singidunum Journal of Applied Sciences, 2014, pp. 687 -692. 9. Solving Cyber Security Challenges using Big Data, Prajakta Joglekar, Nitin Pise, International Journal of Computer Applications (0975– 8887)Volume 154–No.4, November 2016 Received on 21.05.2020 Accepted on 19.06.2020 ©A&V Publications all right reserved Research J. Engineering and Tech. 2020;11(2):45-48. DOI: 10.5958/2321-581X.2020.00008.2