Overall review of cryptography. Comparison between asymmetric and symmetric cryptography. Why asymmetric cryptography is better than symmetric cryptography. Usefulness of asymmetric crytography.
2. 105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
Woodstock ’18, June 03–05, 2018, Woodstock, NY
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
2 RESEARCH METHODOLOGY
.
2.1 Research Objective
Network security is one of the most concern topic in recent times because of vast usage of computer in every sector
in our life. So securing these devices from any unauthorized users or activity to protect the data and information is
very difficult task. But to secure these networks and devices cryptography is a most promising and rapidly growing
technology which is very much trust worthy and rapidly deployed technology. The main objective of this paper is to
analyze and identify the working mechanism of cryptography, its type symmetric and asymmetric cryptography, their
limitations, cryptographic attacks and future of cryptography.[7]
2.2 Research Questions
2.2.1 What is the importance of network security in modern world?
2.2.2 What are the basic terminologies of cryptography?
2.2.3 How cryptography is more secure in contrast to other network security techniques?
2.2.4 what are the differences between symmetric cryptography and asymmetric cryptography?
2.2.5 what is the disadvantages of Cryptography?
2.3 Article Section
2.4 Keywords and Search String:
It is the initial step of selecting articles after choosing the research domain and topic. Our topic is ‘Cryptography’ so we
at first search with the keyword cryptography which resulted in showing a few articles on cryptography which was not
covering the whole process of cryptography. After that, we search using strings like ‘network security: cryptography’,
‘literature review on cryptography’, ‘techniques of hiding information’, ‘research on cryptography’. From the search
results, we collected our papers.[8]
2.5 Digital Libraries To Search:
To attain relevant article, we searched on popular sites like ‘Google Scholar’, ‘Research Gate’, ‘Institute of Electrical and
Electronics Engineers (IEEE)’, ‘Association for Computing Machinery (ACM)’.
2.6 Keyword Search and Manual Selection:
With automated keyword search lots of articles were found and few of them didn’t match to our topic for this we have
to manually select the papers which were specificly related to our topic. After selecting few articles we again shorted
our list in oder to select only those articles which are more relevant to our topic.
2.7 Final Set of Articles:
After manual selection we selected our final set of articles which we are going to use as reference. We used the final set
of articles to carry out our research.
2
3. 209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
3 DISCUSSION:
3.1 What is the importance of network security in modern world?
Ans:In this modern world the important aspect is network security over the internet. For protecting client data an
efficient, stable, strong network security is needed. Network security also prevent the data from sabotage and hacker. It
also protects any network consisting of huge number of pc from harmful spyware. It can make sure that the data which
is shared is safe and secure.To ensure network security cryptography technique is used. Cryptography is a technique
that ensures the data packet is secured or not hacked by unauthorized individuals from the network layer and data link
layer.[4]
3.2 . What are the basic terminologies of cryptography?
Ans: Although there are two types of cryptography most of the term are same for both types. To apply cryptography
first we need a plain text. A plain text is a file that contains information that is going to be encrypted before transmitting.
Encryption algorithm is another basic term in cryptography it is nothing but a mathematical process that converts plain
text into cipher text. Plain text and encryption key is used as the input of the procedure. Cipher text is the encryption
version of plain text which produced by encryption algorithm. Encryption key is the special that is given as input by
the sender in encryption algorithm, whereas decryption key is the special key that is given input by the receiver as
input in decryption algorithm. Decryption algorithm also in nothing but mathematical process that produces plain text
from the cipher text. These are the basic terminologies of cryptography.[7]
3.3 How cryptography is more secure in contrast to other network security techniques?
Ans: Cryptography encrypt data or plain text converting it into cipher text before transmitting the data over the
network. The cipher text can only be decrypted at the receiver end. Even if the data gets intercepted from the network
in can’t be modified or changed by the hacker or malicious individuals. Moreover, hackers can’t read the data because
to decrypt the data it needs secret key which only known to the receiver. So, there is no chance of stealing data from
network layer. Where firewall, access control, antivirus software, network segmentation etc. techniques only provides
security in host computers but the network layers remain unsecure and data can be intercepted and modified in the
network layer by the hackers, whereas cryptography ensures network layer safety. In addition, cryptography provides
condentiality, integrity, non-repudiation, authentication which are the basic goals of secure network.[3]
3.4 what are the differences between symmetric cryptography and asymmetric cryptography?
Ans: Symmetric cryptography and asymmetric cryptography both almost uses same mechanism to encrypt and decrypt
data but asymmetric uses a pair of unique keys which is known as private key. For symmetric encryption and decryption
of a plain text is done with similar key (public key). But asymmetric encryption and decryption of a plain text is done
with similar public key and a pair of private keys which is dissimilar for every user. Although the public key remains
same for both sender and receiver in asymmetric cryptography.[1]
3.5 what is the disadvantages of Cryptography?
Ans: Though cryptography ensures data safety it has few drawbacks. It wastes time to encrypt and decrypt plain text.
This process won’t a valid user to access data if user forgets his/her key. Cryptography is weak against brute force
attack. Implementation of cryptography is costly. Moreover, it doesn’t protect against the vulnerabilities and threats
3
4. 313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
Woodstock ’18, June 03–05, 2018, Woodstock, NY
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
generated from poor system design. Encryption and decryption is nothing but mathematical process any mistake in
mathematical term will result in system breakdown.[9]
4 FUTURE OF CRYPTOGRAPHY:
To keep up with the modern needs in information cryptography is also evolving and enhancing.
4.1 Homomorphic encryption:
Homomorphic encryption is a new ecryption technology. In this technology users are allowed to process data without
decrypting it. With the help of homomorphic encryption encrypted data can be processed and encrypted result might
be produced.
4.2 Hardware-based whole disk encryption:
In this encryption technology after given a key the whole contents of a volume encrypts it after it is used. But this
technology might fall against networks attacks via mail or websites .It only protect data if a laptop or a device is being
stolen and it requires a key to decrypt such kind of data.[10]
4.3 Moving target defense:
The most common problem faced by data security is not whether or not data is encrypted, it’s because of users use the
same code as the attackers. In this kind of case moving target defense can be great helpful. The technique used in this
process is that here the attack surface is constantly changed as a result attackers are not able to spend time reverse
engineering user environment.
4.4 Block Chain:
This technology is used to secure crypto-currencies like bit-coin and Ethereum. It can be used as a strong weapon
against cyber threats. When block-chain technology is applied to cyber-security models, to increases target fungibility
all the lights are turned on. This helps to prevent making fake identification. This technology might become a very
powerful tool for IOT.[2]
4.5 Quantum cryptography
For transmitting a secret key or password over a distance this is the only proven or verified method. To physically move
a common file between two parties it uses photons of light. Concern is that this photons of light might be intercepted
with each other but it is ensured that this data or information can’t be cloned or copied.[5]
5 VALIDITY THREAT:
5.1 Selection of Article:
The articles were selected according to research related topic. The articles were searched by the keywords then among
the various articles only the most relevant to our topic articles were selected manually by all the authors.[1]
4
5. 417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
5.2 Experimenter bias:
All the researcher agreed upon the references that are being used for this paper. To avoid inadvertently conflicts between
members all the researchers communicate with each other until the end of the research.[9]
5.3 Data Falsification:
All the data used on this research paper are valid. Data provided in this paper are collected from the previous researches
conducted on this topic and the reference of those paper are given correctly.[4]
6 CONCLUSION:
In this modern era of technology everyone transfers information or data to others through technology. People like us
transfer information or receive information with risk. For different reason we take the advantage of Internet when we
emit data or get the data, but the main issue is that the data are transferred or received by people may be accessed by
hacker or unauthorized user out there in cyberspace. So, data security should be the main thought to all Internet users.
There needs digital keys and proper protection for the Cryptography to make sure that the data has been transferred to
the receiver side is safe and secure. In that case Encryption decryption technique should be applied in such a way so
that a professional hacker can’t get the information at any cost. We need to modify our information into hard-reading
forms so that the information that transferred is secured and will get to the target safely. Nowadays, we are having
the risk of security in data that’s why we need a tight security to secure us from the hacker and also improve the
cryptography techniques or methods because the cyber criminals are becoming smarter day by day.[4]
REFERENCES
[1] Sattam S Al-Riyami and Kenneth G Paterson. [n.d.]. Certificateless public key cryptography. ([n. d.]). 146.https://ijcsmc.com/docs/papers/July2017/
V6I7201732.pdf
[2] Antonio, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. [n.d.]. Device-independent security of quantum
cryptography against collective attacks. ([n. d.]).
[3] Dr. Pankaj Gupta Deepak Goyal Monika Goyal. Dr. Sandeep Tayal, Dr. Nipin Gupta. 2017.. A Review paper on Network Security and Cryptography.
(2017.).
[4] ennifer Rowley. [n.d.]. Using Case Studies in Research. ([n. d.]).
[5] Sanjay Bhargava Kritika Acharya, Manisha Sajwan. [n.d.]. Analysis of Cryptographic Algorithms for Network Security. ([n. d.]).
[6] Shyam Nandan Kumar. 2015. Review on Network Security and Cryptography. (2015).
[7] SMohammad Tanveer Khan.2017. Review: Network Security Mechanisms and Cryptography. 2017.. Computer Science and Mobile Computing.
(2017.).
[8] William Stallings. [n.d.]. Cryptography and Network Security. ([n. d.]).
[9] ANDROID TUTORIAL. [n.d.]. Importanceo fC ryptoдraphyi nI nf ormationS ecurity.([n. d.]).
[10] John Viega, Matt Messier, and Pravir Chandra. [n.d.]. Network security with openSSL: cryptography for secure communications. ([n. d.]).
A A CONTRIBUTION RECORD:
A.1 A.1 Paper Assesment:
A.2 A.2 Paper writing contribution:
5
6. 521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
Woodstock ’18, June 03–05, 2018, Woodstock, NY
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
Student id & name Paper No
from Ref
Paper Title
17-33837-1
Salauddin,Towsif [3],[6],[7],[8] A Review paper on Network Security and Cryp-
tography, Review on Network Security and
Cryptography,Review: Network Security Mech-
anisms and Cryptography,Cryptography and
Network Security Cryptography
17-33958-1
Tanzin-Ul-Islam Md. [1],[2],[4],[9] Certificateless public key cryptography, Device-
independent security of quantum cryptog-
raphy against collective attacks,sing Case
Studies in Research,sing Case Studies in Re-
search,Cryptography and network security
17-33846-1
Imran,Fardin Ahsan [5],[10] Analysis of Cryptographic Algorithms for Net-
work Security,Network security with openSSL:
cryptography for secure communications.
Table 1. Paper collected and read by the group member
Student id & name Section No Section Title
17-33837-1
Salauddin,Towsif 1,2.2.3,2.2.4,2.3.1,
2.3.2,3.3,3.4,5.1,
4.4,4.5
Abstract,Introduction,Keyword and search
string,Digital libraries to search, How cryp-
tography is more secure in contrast to other
network security techniques?,what are the
differences between symmetric cryptography
and asymmetric cryptography?,Selection of
articles,Block Chain, Quantum cryptography
17-33958-1
Tanzin-Ul-Islam Md. 2.1,2.2.2,2.2.5,5.2,
4.1,4.2
Research Objective, What are the basic termi-
nologies of cryptography?what is the disad-
vantages of Cryptography? Keyword Search
and Manual Selection,Final Set of Articles,
Experimenter bias, Homomorphic encryption,
Hardware-based whole disk encryption
17-33846-1
Imran,Fardin Ahsan 5.3,6,3.1,2.2.1 Data falsification.conclusion, What is the im-
portance of network security in modern world?
Table 2. Section(s) Written in the paper by the group member
6