SlideShare a Scribd company logo
1 of 6
Download to read offline
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
Network Security and Analysis of Crypography Mechanism: Case Study
Method
SALAUDDIN,TOWSIF, 17-33837-1 sec:B Dept:CS American International University Bangladesh
TANZIN-UL-ISLAM MD., 17-33958-1 sec:B CS American International University Bangladesh
IMRAN,FARDIN AHSAN, 17-33846-1 sec:B CS American International University Bangladesh
Network security has turned out to be the most concerning issue with the enlargement of computer network technology in the
last few decades. Organizations, individuals became more conscious regarding the matter of network security and wants to secure
their information from the unauthorized persona. Therefore, network security caught the attention of the research community
and much research was conducted in this sector. As a result, those efforts yield numerous methods to secure the network. Among
those techniques, cryptography is one of the most popular and accepted method. This paper attempts to provide an overview of the
cryptography technique thoroughly after studying 10 papers systematically which were published in pertinent venues. The study
result provides the pros and cons of cryptography, identifies incapacities and opportunities, and future possibilities.[? ? , 2]1
CCS Concepts: • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks →
Network reliability.
Additional Key Words and Phrases: datasets, neural networks, gaze detection, text tagging
ACM Reference Format:
Salauddin,Towsif, Tanzin-Ul-Islam Md., and Imran,Fardin Ahsan. . Network Security and Analysis of Crypography Mechanism: Case
Study Method. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY. ACM, New York, NY,
USA, 6 pages. https://doi.org/10.1145/1122445.1122456
1 INTRODUCTION
The enlargement of network and information technology caused associations and individuals to join the internet. which
results in a tremendous amount of data transmission over the network every day. If data in the network is hijacked by
unauthorized persona it can bring harm to individuals and organizations. To restrict data plunder in network layer
multiple network security techniques have been developed. Among them, cryptography is the most accepted method in
the present world as the other conventional methods failed to provide information security in the network In general,
cryptography is a process that hides data from unauthorized persons. It provides information security in the network
by encrypting plain text which can be decrypted only by keys that are shared between the sender and receiver. So
even if the data get stripped from the network, hacker or wicked user won’t be able to read the massage. There are
two standards of cryptography one is symmetric cryptography and the other one is asymmetric cryptography. Both
types of cryptography use a common key which is known as public key but asymmetric cryptography uses another
special type of key which is known as the private key and unique for each user. Despite some drawbacks, cryptography
provides confidentiality, integrity, non-repudiation and authentication facilities.[1][6]
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components
of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to
redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
© Association for Computing Machinery.
Manuscript submitted to ACM
1
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
Woodstock ’18, June 03–05, 2018, Woodstock, NY
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
2 RESEARCH METHODOLOGY
.
2.1 Research Objective
Network security is one of the most concern topic in recent times because of vast usage of computer in every sector
in our life. So securing these devices from any unauthorized users or activity to protect the data and information is
very difficult task. But to secure these networks and devices cryptography is a most promising and rapidly growing
technology which is very much trust worthy and rapidly deployed technology. The main objective of this paper is to
analyze and identify the working mechanism of cryptography, its type symmetric and asymmetric cryptography, their
limitations, cryptographic attacks and future of cryptography.[7]
2.2 Research Questions
2.2.1 What is the importance of network security in modern world?
2.2.2 What are the basic terminologies of cryptography?
2.2.3 How cryptography is more secure in contrast to other network security techniques?
2.2.4 what are the differences between symmetric cryptography and asymmetric cryptography?
2.2.5 what is the disadvantages of Cryptography?
2.3 Article Section
2.4 Keywords and Search String:
It is the initial step of selecting articles after choosing the research domain and topic. Our topic is ‘Cryptography’ so we
at first search with the keyword cryptography which resulted in showing a few articles on cryptography which was not
covering the whole process of cryptography. After that, we search using strings like ‘network security: cryptography’,
‘literature review on cryptography’, ‘techniques of hiding information’, ‘research on cryptography’. From the search
results, we collected our papers.[8]
2.5 Digital Libraries To Search:
To attain relevant article, we searched on popular sites like ‘Google Scholar’, ‘Research Gate’, ‘Institute of Electrical and
Electronics Engineers (IEEE)’, ‘Association for Computing Machinery (ACM)’.
2.6 Keyword Search and Manual Selection:
With automated keyword search lots of articles were found and few of them didn’t match to our topic for this we have
to manually select the papers which were specificly related to our topic. After selecting few articles we again shorted
our list in oder to select only those articles which are more relevant to our topic.
2.7 Final Set of Articles:
After manual selection we selected our final set of articles which we are going to use as reference. We used the final set
of articles to carry out our research.
2
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
3 DISCUSSION:
3.1 What is the importance of network security in modern world?
Ans:In this modern world the important aspect is network security over the internet. For protecting client data an
efficient, stable, strong network security is needed. Network security also prevent the data from sabotage and hacker. It
also protects any network consisting of huge number of pc from harmful spyware. It can make sure that the data which
is shared is safe and secure.To ensure network security cryptography technique is used. Cryptography is a technique
that ensures the data packet is secured or not hacked by unauthorized individuals from the network layer and data link
layer.[4]
3.2 . What are the basic terminologies of cryptography?
Ans: Although there are two types of cryptography most of the term are same for both types. To apply cryptography
first we need a plain text. A plain text is a file that contains information that is going to be encrypted before transmitting.
Encryption algorithm is another basic term in cryptography it is nothing but a mathematical process that converts plain
text into cipher text. Plain text and encryption key is used as the input of the procedure. Cipher text is the encryption
version of plain text which produced by encryption algorithm. Encryption key is the special that is given as input by
the sender in encryption algorithm, whereas decryption key is the special key that is given input by the receiver as
input in decryption algorithm. Decryption algorithm also in nothing but mathematical process that produces plain text
from the cipher text. These are the basic terminologies of cryptography.[7]
3.3 How cryptography is more secure in contrast to other network security techniques?
Ans: Cryptography encrypt data or plain text converting it into cipher text before transmitting the data over the
network. The cipher text can only be decrypted at the receiver end. Even if the data gets intercepted from the network
in can’t be modified or changed by the hacker or malicious individuals. Moreover, hackers can’t read the data because
to decrypt the data it needs secret key which only known to the receiver. So, there is no chance of stealing data from
network layer. Where firewall, access control, antivirus software, network segmentation etc. techniques only provides
security in host computers but the network layers remain unsecure and data can be intercepted and modified in the
network layer by the hackers, whereas cryptography ensures network layer safety. In addition, cryptography provides
condentiality, integrity, non-repudiation, authentication which are the basic goals of secure network.[3]
3.4 what are the differences between symmetric cryptography and asymmetric cryptography?
Ans: Symmetric cryptography and asymmetric cryptography both almost uses same mechanism to encrypt and decrypt
data but asymmetric uses a pair of unique keys which is known as private key. For symmetric encryption and decryption
of a plain text is done with similar key (public key). But asymmetric encryption and decryption of a plain text is done
with similar public key and a pair of private keys which is dissimilar for every user. Although the public key remains
same for both sender and receiver in asymmetric cryptography.[1]
3.5 what is the disadvantages of Cryptography?
Ans: Though cryptography ensures data safety it has few drawbacks. It wastes time to encrypt and decrypt plain text.
This process won’t a valid user to access data if user forgets his/her key. Cryptography is weak against brute force
attack. Implementation of cryptography is costly. Moreover, it doesn’t protect against the vulnerabilities and threats
3
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
Woodstock ’18, June 03–05, 2018, Woodstock, NY
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
generated from poor system design. Encryption and decryption is nothing but mathematical process any mistake in
mathematical term will result in system breakdown.[9]
4 FUTURE OF CRYPTOGRAPHY:
To keep up with the modern needs in information cryptography is also evolving and enhancing.
4.1 Homomorphic encryption:
Homomorphic encryption is a new ecryption technology. In this technology users are allowed to process data without
decrypting it. With the help of homomorphic encryption encrypted data can be processed and encrypted result might
be produced.
4.2 Hardware-based whole disk encryption:
In this encryption technology after given a key the whole contents of a volume encrypts it after it is used. But this
technology might fall against networks attacks via mail or websites .It only protect data if a laptop or a device is being
stolen and it requires a key to decrypt such kind of data.[10]
4.3 Moving target defense:
The most common problem faced by data security is not whether or not data is encrypted, it’s because of users use the
same code as the attackers. In this kind of case moving target defense can be great helpful. The technique used in this
process is that here the attack surface is constantly changed as a result attackers are not able to spend time reverse
engineering user environment.
4.4 Block Chain:
This technology is used to secure crypto-currencies like bit-coin and Ethereum. It can be used as a strong weapon
against cyber threats. When block-chain technology is applied to cyber-security models, to increases target fungibility
all the lights are turned on. This helps to prevent making fake identification. This technology might become a very
powerful tool for IOT.[2]
4.5 Quantum cryptography
For transmitting a secret key or password over a distance this is the only proven or verified method. To physically move
a common file between two parties it uses photons of light. Concern is that this photons of light might be intercepted
with each other but it is ensured that this data or information can’t be cloned or copied.[5]
5 VALIDITY THREAT:
5.1 Selection of Article:
The articles were selected according to research related topic. The articles were searched by the keywords then among
the various articles only the most relevant to our topic articles were selected manually by all the authors.[1]
4
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
5.2 Experimenter bias:
All the researcher agreed upon the references that are being used for this paper. To avoid inadvertently conflicts between
members all the researchers communicate with each other until the end of the research.[9]
5.3 Data Falsification:
All the data used on this research paper are valid. Data provided in this paper are collected from the previous researches
conducted on this topic and the reference of those paper are given correctly.[4]
6 CONCLUSION:
In this modern era of technology everyone transfers information or data to others through technology. People like us
transfer information or receive information with risk. For different reason we take the advantage of Internet when we
emit data or get the data, but the main issue is that the data are transferred or received by people may be accessed by
hacker or unauthorized user out there in cyberspace. So, data security should be the main thought to all Internet users.
There needs digital keys and proper protection for the Cryptography to make sure that the data has been transferred to
the receiver side is safe and secure. In that case Encryption decryption technique should be applied in such a way so
that a professional hacker can’t get the information at any cost. We need to modify our information into hard-reading
forms so that the information that transferred is secured and will get to the target safely. Nowadays, we are having
the risk of security in data that’s why we need a tight security to secure us from the hacker and also improve the
cryptography techniques or methods because the cyber criminals are becoming smarter day by day.[4]
REFERENCES
[1] Sattam S Al-Riyami and Kenneth G Paterson. [n.d.]. Certificateless public key cryptography. ([n. d.]). 146.https://ijcsmc.com/docs/papers/July2017/
V6I7201732.pdf
[2] Antonio, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. [n.d.]. Device-independent security of quantum
cryptography against collective attacks. ([n. d.]).
[3] Dr. Pankaj Gupta Deepak Goyal Monika Goyal. Dr. Sandeep Tayal, Dr. Nipin Gupta. 2017.. A Review paper on Network Security and Cryptography.
(2017.).
[4] ennifer Rowley. [n.d.]. Using Case Studies in Research. ([n. d.]).
[5] Sanjay Bhargava Kritika Acharya, Manisha Sajwan. [n.d.]. Analysis of Cryptographic Algorithms for Network Security. ([n. d.]).
[6] Shyam Nandan Kumar. 2015. Review on Network Security and Cryptography. (2015).
[7] SMohammad Tanveer Khan.2017. Review: Network Security Mechanisms and Cryptography. 2017.. Computer Science and Mobile Computing.
(2017.).
[8] William Stallings. [n.d.]. Cryptography and Network Security. ([n. d.]).
[9] ANDROID TUTORIAL. [n.d.]. Importanceo fC ryptoдraphyi nI nf ormationS ecurity.([n. d.]).
[10] John Viega, Matt Messier, and Pravir Chandra. [n.d.]. Network security with openSSL: cryptography for secure communications. ([n. d.]).
A A CONTRIBUTION RECORD:
A.1 A.1 Paper Assesment:
A.2 A.2 Paper writing contribution:
5
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
Woodstock ’18, June 03–05, 2018, Woodstock, NY
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
Student id & name Paper No
from Ref
Paper Title
17-33837-1
Salauddin,Towsif [3],[6],[7],[8] A Review paper on Network Security and Cryp-
tography, Review on Network Security and
Cryptography,Review: Network Security Mech-
anisms and Cryptography,Cryptography and
Network Security Cryptography
17-33958-1
Tanzin-Ul-Islam Md. [1],[2],[4],[9] Certificateless public key cryptography, Device-
independent security of quantum cryptog-
raphy against collective attacks,sing Case
Studies in Research,sing Case Studies in Re-
search,Cryptography and network security
17-33846-1
Imran,Fardin Ahsan [5],[10] Analysis of Cryptographic Algorithms for Net-
work Security,Network security with openSSL:
cryptography for secure communications.
Table 1. Paper collected and read by the group member
Student id & name Section No Section Title
17-33837-1
Salauddin,Towsif 1,2.2.3,2.2.4,2.3.1,
2.3.2,3.3,3.4,5.1,
4.4,4.5
Abstract,Introduction,Keyword and search
string,Digital libraries to search, How cryp-
tography is more secure in contrast to other
network security techniques?,what are the
differences between symmetric cryptography
and asymmetric cryptography?,Selection of
articles,Block Chain, Quantum cryptography
17-33958-1
Tanzin-Ul-Islam Md. 2.1,2.2.2,2.2.5,5.2,
4.1,4.2
Research Objective, What are the basic termi-
nologies of cryptography?what is the disad-
vantages of Cryptography? Keyword Search
and Manual Selection,Final Set of Articles,
Experimenter bias, Homomorphic encryption,
Hardware-based whole disk encryption
17-33846-1
Imran,Fardin Ahsan 5.3,6,3.1,2.2.1 Data falsification.conclusion, What is the im-
portance of network security in modern world?
Table 2. Section(s) Written in the paper by the group member
6

More Related Content

What's hot

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay Dean Kay
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 

What's hot (20)

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 
Network security
Network securityNetwork security
Network security
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Bg34369370
Bg34369370Bg34369370
Bg34369370
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 

Similar to Literature review on cryptography

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCarla Bennington
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesIJERA Editor
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 

Similar to Literature review on cryptography (20)

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart Phones
 
Cyber security
Cyber securityCyber security
Cyber security
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Literature review on cryptography

  • 1. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 Network Security and Analysis of Crypography Mechanism: Case Study Method SALAUDDIN,TOWSIF, 17-33837-1 sec:B Dept:CS American International University Bangladesh TANZIN-UL-ISLAM MD., 17-33958-1 sec:B CS American International University Bangladesh IMRAN,FARDIN AHSAN, 17-33846-1 sec:B CS American International University Bangladesh Network security has turned out to be the most concerning issue with the enlargement of computer network technology in the last few decades. Organizations, individuals became more conscious regarding the matter of network security and wants to secure their information from the unauthorized persona. Therefore, network security caught the attention of the research community and much research was conducted in this sector. As a result, those efforts yield numerous methods to secure the network. Among those techniques, cryptography is one of the most popular and accepted method. This paper attempts to provide an overview of the cryptography technique thoroughly after studying 10 papers systematically which were published in pertinent venues. The study result provides the pros and cons of cryptography, identifies incapacities and opportunities, and future possibilities.[? ? , 2]1 CCS Concepts: • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability. Additional Key Words and Phrases: datasets, neural networks, gaze detection, text tagging ACM Reference Format: Salauddin,Towsif, Tanzin-Ul-Islam Md., and Imran,Fardin Ahsan. . Network Security and Analysis of Crypography Mechanism: Case Study Method. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY. ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/1122445.1122456 1 INTRODUCTION The enlargement of network and information technology caused associations and individuals to join the internet. which results in a tremendous amount of data transmission over the network every day. If data in the network is hijacked by unauthorized persona it can bring harm to individuals and organizations. To restrict data plunder in network layer multiple network security techniques have been developed. Among them, cryptography is the most accepted method in the present world as the other conventional methods failed to provide information security in the network In general, cryptography is a process that hides data from unauthorized persons. It provides information security in the network by encrypting plain text which can be decrypted only by keys that are shared between the sender and receiver. So even if the data get stripped from the network, hacker or wicked user won’t be able to read the massage. There are two standards of cryptography one is symmetric cryptography and the other one is asymmetric cryptography. Both types of cryptography use a common key which is known as public key but asymmetric cryptography uses another special type of key which is known as the private key and unique for each user. Despite some drawbacks, cryptography provides confidentiality, integrity, non-repudiation and authentication facilities.[1][6] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © Association for Computing Machinery. Manuscript submitted to ACM 1
  • 2. 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 Woodstock ’18, June 03–05, 2018, Woodstock, NY 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 2 RESEARCH METHODOLOGY . 2.1 Research Objective Network security is one of the most concern topic in recent times because of vast usage of computer in every sector in our life. So securing these devices from any unauthorized users or activity to protect the data and information is very difficult task. But to secure these networks and devices cryptography is a most promising and rapidly growing technology which is very much trust worthy and rapidly deployed technology. The main objective of this paper is to analyze and identify the working mechanism of cryptography, its type symmetric and asymmetric cryptography, their limitations, cryptographic attacks and future of cryptography.[7] 2.2 Research Questions 2.2.1 What is the importance of network security in modern world? 2.2.2 What are the basic terminologies of cryptography? 2.2.3 How cryptography is more secure in contrast to other network security techniques? 2.2.4 what are the differences between symmetric cryptography and asymmetric cryptography? 2.2.5 what is the disadvantages of Cryptography? 2.3 Article Section 2.4 Keywords and Search String: It is the initial step of selecting articles after choosing the research domain and topic. Our topic is ‘Cryptography’ so we at first search with the keyword cryptography which resulted in showing a few articles on cryptography which was not covering the whole process of cryptography. After that, we search using strings like ‘network security: cryptography’, ‘literature review on cryptography’, ‘techniques of hiding information’, ‘research on cryptography’. From the search results, we collected our papers.[8] 2.5 Digital Libraries To Search: To attain relevant article, we searched on popular sites like ‘Google Scholar’, ‘Research Gate’, ‘Institute of Electrical and Electronics Engineers (IEEE)’, ‘Association for Computing Machinery (ACM)’. 2.6 Keyword Search and Manual Selection: With automated keyword search lots of articles were found and few of them didn’t match to our topic for this we have to manually select the papers which were specificly related to our topic. After selecting few articles we again shorted our list in oder to select only those articles which are more relevant to our topic. 2.7 Final Set of Articles: After manual selection we selected our final set of articles which we are going to use as reference. We used the final set of articles to carry out our research. 2
  • 3. 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 3 DISCUSSION: 3.1 What is the importance of network security in modern world? Ans:In this modern world the important aspect is network security over the internet. For protecting client data an efficient, stable, strong network security is needed. Network security also prevent the data from sabotage and hacker. It also protects any network consisting of huge number of pc from harmful spyware. It can make sure that the data which is shared is safe and secure.To ensure network security cryptography technique is used. Cryptography is a technique that ensures the data packet is secured or not hacked by unauthorized individuals from the network layer and data link layer.[4] 3.2 . What are the basic terminologies of cryptography? Ans: Although there are two types of cryptography most of the term are same for both types. To apply cryptography first we need a plain text. A plain text is a file that contains information that is going to be encrypted before transmitting. Encryption algorithm is another basic term in cryptography it is nothing but a mathematical process that converts plain text into cipher text. Plain text and encryption key is used as the input of the procedure. Cipher text is the encryption version of plain text which produced by encryption algorithm. Encryption key is the special that is given as input by the sender in encryption algorithm, whereas decryption key is the special key that is given input by the receiver as input in decryption algorithm. Decryption algorithm also in nothing but mathematical process that produces plain text from the cipher text. These are the basic terminologies of cryptography.[7] 3.3 How cryptography is more secure in contrast to other network security techniques? Ans: Cryptography encrypt data or plain text converting it into cipher text before transmitting the data over the network. The cipher text can only be decrypted at the receiver end. Even if the data gets intercepted from the network in can’t be modified or changed by the hacker or malicious individuals. Moreover, hackers can’t read the data because to decrypt the data it needs secret key which only known to the receiver. So, there is no chance of stealing data from network layer. Where firewall, access control, antivirus software, network segmentation etc. techniques only provides security in host computers but the network layers remain unsecure and data can be intercepted and modified in the network layer by the hackers, whereas cryptography ensures network layer safety. In addition, cryptography provides condentiality, integrity, non-repudiation, authentication which are the basic goals of secure network.[3] 3.4 what are the differences between symmetric cryptography and asymmetric cryptography? Ans: Symmetric cryptography and asymmetric cryptography both almost uses same mechanism to encrypt and decrypt data but asymmetric uses a pair of unique keys which is known as private key. For symmetric encryption and decryption of a plain text is done with similar key (public key). But asymmetric encryption and decryption of a plain text is done with similar public key and a pair of private keys which is dissimilar for every user. Although the public key remains same for both sender and receiver in asymmetric cryptography.[1] 3.5 what is the disadvantages of Cryptography? Ans: Though cryptography ensures data safety it has few drawbacks. It wastes time to encrypt and decrypt plain text. This process won’t a valid user to access data if user forgets his/her key. Cryptography is weak against brute force attack. Implementation of cryptography is costly. Moreover, it doesn’t protect against the vulnerabilities and threats 3
  • 4. 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 Woodstock ’18, June 03–05, 2018, Woodstock, NY 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 generated from poor system design. Encryption and decryption is nothing but mathematical process any mistake in mathematical term will result in system breakdown.[9] 4 FUTURE OF CRYPTOGRAPHY: To keep up with the modern needs in information cryptography is also evolving and enhancing. 4.1 Homomorphic encryption: Homomorphic encryption is a new ecryption technology. In this technology users are allowed to process data without decrypting it. With the help of homomorphic encryption encrypted data can be processed and encrypted result might be produced. 4.2 Hardware-based whole disk encryption: In this encryption technology after given a key the whole contents of a volume encrypts it after it is used. But this technology might fall against networks attacks via mail or websites .It only protect data if a laptop or a device is being stolen and it requires a key to decrypt such kind of data.[10] 4.3 Moving target defense: The most common problem faced by data security is not whether or not data is encrypted, it’s because of users use the same code as the attackers. In this kind of case moving target defense can be great helpful. The technique used in this process is that here the attack surface is constantly changed as a result attackers are not able to spend time reverse engineering user environment. 4.4 Block Chain: This technology is used to secure crypto-currencies like bit-coin and Ethereum. It can be used as a strong weapon against cyber threats. When block-chain technology is applied to cyber-security models, to increases target fungibility all the lights are turned on. This helps to prevent making fake identification. This technology might become a very powerful tool for IOT.[2] 4.5 Quantum cryptography For transmitting a secret key or password over a distance this is the only proven or verified method. To physically move a common file between two parties it uses photons of light. Concern is that this photons of light might be intercepted with each other but it is ensured that this data or information can’t be cloned or copied.[5] 5 VALIDITY THREAT: 5.1 Selection of Article: The articles were selected according to research related topic. The articles were searched by the keywords then among the various articles only the most relevant to our topic articles were selected manually by all the authors.[1] 4
  • 5. 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 5.2 Experimenter bias: All the researcher agreed upon the references that are being used for this paper. To avoid inadvertently conflicts between members all the researchers communicate with each other until the end of the research.[9] 5.3 Data Falsification: All the data used on this research paper are valid. Data provided in this paper are collected from the previous researches conducted on this topic and the reference of those paper are given correctly.[4] 6 CONCLUSION: In this modern era of technology everyone transfers information or data to others through technology. People like us transfer information or receive information with risk. For different reason we take the advantage of Internet when we emit data or get the data, but the main issue is that the data are transferred or received by people may be accessed by hacker or unauthorized user out there in cyberspace. So, data security should be the main thought to all Internet users. There needs digital keys and proper protection for the Cryptography to make sure that the data has been transferred to the receiver side is safe and secure. In that case Encryption decryption technique should be applied in such a way so that a professional hacker can’t get the information at any cost. We need to modify our information into hard-reading forms so that the information that transferred is secured and will get to the target safely. Nowadays, we are having the risk of security in data that’s why we need a tight security to secure us from the hacker and also improve the cryptography techniques or methods because the cyber criminals are becoming smarter day by day.[4] REFERENCES [1] Sattam S Al-Riyami and Kenneth G Paterson. [n.d.]. Certificateless public key cryptography. ([n. d.]). 146.https://ijcsmc.com/docs/papers/July2017/ V6I7201732.pdf [2] Antonio, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. [n.d.]. Device-independent security of quantum cryptography against collective attacks. ([n. d.]). [3] Dr. Pankaj Gupta Deepak Goyal Monika Goyal. Dr. Sandeep Tayal, Dr. Nipin Gupta. 2017.. A Review paper on Network Security and Cryptography. (2017.). [4] ennifer Rowley. [n.d.]. Using Case Studies in Research. ([n. d.]). [5] Sanjay Bhargava Kritika Acharya, Manisha Sajwan. [n.d.]. Analysis of Cryptographic Algorithms for Network Security. ([n. d.]). [6] Shyam Nandan Kumar. 2015. Review on Network Security and Cryptography. (2015). [7] SMohammad Tanveer Khan.2017. Review: Network Security Mechanisms and Cryptography. 2017.. Computer Science and Mobile Computing. (2017.). [8] William Stallings. [n.d.]. Cryptography and Network Security. ([n. d.]). [9] ANDROID TUTORIAL. [n.d.]. Importanceo fC ryptoдraphyi nI nf ormationS ecurity.([n. d.]). [10] John Viega, Matt Messier, and Pravir Chandra. [n.d.]. Network security with openSSL: cryptography for secure communications. ([n. d.]). A A CONTRIBUTION RECORD: A.1 A.1 Paper Assesment: A.2 A.2 Paper writing contribution: 5
  • 6. 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 Woodstock ’18, June 03–05, 2018, Woodstock, NY 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 Student id & name Paper No from Ref Paper Title 17-33837-1 Salauddin,Towsif [3],[6],[7],[8] A Review paper on Network Security and Cryp- tography, Review on Network Security and Cryptography,Review: Network Security Mech- anisms and Cryptography,Cryptography and Network Security Cryptography 17-33958-1 Tanzin-Ul-Islam Md. [1],[2],[4],[9] Certificateless public key cryptography, Device- independent security of quantum cryptog- raphy against collective attacks,sing Case Studies in Research,sing Case Studies in Re- search,Cryptography and network security 17-33846-1 Imran,Fardin Ahsan [5],[10] Analysis of Cryptographic Algorithms for Net- work Security,Network security with openSSL: cryptography for secure communications. Table 1. Paper collected and read by the group member Student id & name Section No Section Title 17-33837-1 Salauddin,Towsif 1,2.2.3,2.2.4,2.3.1, 2.3.2,3.3,3.4,5.1, 4.4,4.5 Abstract,Introduction,Keyword and search string,Digital libraries to search, How cryp- tography is more secure in contrast to other network security techniques?,what are the differences between symmetric cryptography and asymmetric cryptography?,Selection of articles,Block Chain, Quantum cryptography 17-33958-1 Tanzin-Ul-Islam Md. 2.1,2.2.2,2.2.5,5.2, 4.1,4.2 Research Objective, What are the basic termi- nologies of cryptography?what is the disad- vantages of Cryptography? Keyword Search and Manual Selection,Final Set of Articles, Experimenter bias, Homomorphic encryption, Hardware-based whole disk encryption 17-33846-1 Imran,Fardin Ahsan 5.3,6,3.1,2.2.1 Data falsification.conclusion, What is the im- portance of network security in modern world? Table 2. Section(s) Written in the paper by the group member 6