Review On Cryptography In Network Security

2y ago
28 Views
2 Downloads
207.73 KB
8 Pages
Last View : 18d ago
Last Download : 3m ago
Upload by : Ryan Jay
Transcription

International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181ETRASCT' 14 Conference ProceedingsReview on Cryptography in Network SecurityMITESH SHARMAM.E. Scholar, Department of Computer Science and EngineeringM.B.M. Engineering CollegeJai NarainVyas University, Jodhpurvulnerable to potential intrusions and attacks.Security of data can be done by a technique calledcryptography. So one can say that cryptography isan emerging technology, which is important fornetwork security. This paper covers the variouscipher generation algorithms of cryptographywhich are helpful in network security.Cryptography in the past was used in keepingmilitary information, diplomatic correspondencesecure and in protecting the national security.However, the use was limited. Nowadays, the rangeof cryptography applications have been expanded alot in the modern area after the development ofcommunication means; cryptography is essentiallyrequired to ensure that data are protected againstpenetrations and to prevent espionage. Also,cryptography is a powerful mean in securing ecommerce.IJERTAbstract—With the explosive growth in theInternet, network security has become aninevitable concern for any organization whoseinternal private network is connected to theInternet. Cryptography is used to ensure that thecontents of a message are confidentialitytransmitted and would not be altered.Confidentiality means nobody can understand thereceived message except the one who has thedecipher key, and data cannot be changed meansthe original information would not be changed ormodified; this is done when the sender includes acryptographic operation called a hash function inthe original message. A hash function is amathematical representation of the information,when any information arrives at its receiver; thereceiver calculates the value of this hash function.If the receiver’s hash function value is equivalent tothe sender’s, the integrity of the message is assured.Network security is setup to guard againstunauthorized access, alteration, or modification ofinformation, and unauthorized denial of service.When a network is connected to the network that isKeyword:Plain Text, Cipher Text, cEncryption ,Hash Algorithm.I. INTRODUCTIONNowadays, cryptography plays a majorrole in protecting the information of technologyapplications. Information security is an importantissue, for some applications. Have the toppriority such as ecommerce, e-banking, e-mail,medical databases, and so many more, all ofthem require the exchange of privateinformation. Cryptography is the transformationof readable and understandable data into a formwhich cannot be understood in order to securedata. Cryptography refers exactly to themethodology of concealing the content ofmessages, the word cryptography comes fromthe Greek word "Kryptos", that means hidden,and "graphikos" which means writing .For example, let us consider a personnamed Alice a sender who wants to send adatamessage which has a length of characters to areceivercalled Bob. Alice uses anunsecurecommunication channel. Which couldbe a telephone line , computer network, or anyother channel. If themessage contains secret data,they could be intercepted and read by hackers.Also they may change ormodify the messageduring its transmission in such a way that Bobwould not be able to discover thechange. In thissurvey a various ways of encryption is viewedand have been compared ,a lot ofexamples havebeen provided .Network security is a new and fastmoving technology and as such, is still beingdefined. When considering the desired learningoutcomes of such a course, one could argue thata network security analyst must be capable ofanalyzing security from the business perspectivein order to adhere to recent security legislation,and from the technical perspective in order tounderstand and select the most appropriatesecurity solution. Network security originallyfocused on algorithmic aspects such asencryption and hashing techniques. While theseconcepts rarely change, these skills alone areinsufficient to protect computer networks. Ascrackers hacked away at networks and systems,www.ijert.org206

International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181ETRASCT' 14 Conference Proceedingscourses arose that emphasized the latest attacks.Currently, many educators believe that to trainpeople to secure networks, they must also learnto think like a cracker. The followingbackground information in security helps inmaking correct decisions: Attack Recognition,Encryption techniques, Network SecurityArchitecture, Protocol analysis, Access controllist and vulnerability. For Network securitycryptography is present. In cryptography datathat can be read and understood without anyspecial measures is called plaintext or clear text.The method of disguising plaintext in such a wayas to hide its substance is called encryption.Encrypting plaintext results in unreadablegibberish called cipher text. We use encryptionto ensure that information is hidden from anyonefor whom it is not intended, even those who cansee the encrypted data. The process of revertingcipher text to its original plain text is calleddecryption. In cryptography three types ofalgorithms are present. Symmetric keyalgorithm, asymmetric key algorithm and hashfunction.occurred, and what is the permissionlevel of a given access.II. Cryptography GoalsIII. IMPORTANCE AND APPROACHESThe information that we need to hide, iscalled plaintext , It’s the original text, It could bein a form ofcharacters, numerical data,executable programs, pictures, or any other kindof information, The plaintextfor example is thefirst draft of a message in the sender beforeencryption, or it is the text at the receiverafterdecryption.The data that will be transmitted iscalled cipher text , it's a term refers to the stringof "meaningless"data, or unclear text that nobodymust understand, except the recipients. it is thedata that will betransmitted Exactly throughnetwork, Many algorithms are used to transformplaintext into cipher textsCipher is the algorithm that is used totransform plaintext to cipher text, This method iscalled encryptionor enciphers (encode), in otherwords, it's a mechanism of converting readableand understandable datainto "meaningless" data,and it is represented as follows:IJERTBy using cryptography many goals can beachieved, These goals can be either all achievedat the sametime in one application, or only oneof them, These goals are:a) Confidentiality:It is the most importantgoal, that ensures that nobody canunderstand thereceived message exceptthe one who has the decipher key.b) Authentication:It is the process ofproving the identity, that assures thecommunicating entity isthe one that itclaimed to be, This means that the useror the system can prove theirownidentities to other parties who don’thave personal knowledge of theiridentities. (The primaryform of host tohost authentication on the Internet todayis name-based or address-based;andboth of them are notoriously weak).c) Data Integrity:Its ensures that thereceived message has not been alteredin any way from itsoriginal form, Thiscan be achieved by using hashing atboth sides the sender and the recipientinorder to create a unique message digestand compare it with the one thatreceived.d) Non-Repudiation:It is mechanism usedto prove that the sender really sent thismessage, ,andthe message was receivedby the specified party, so the recipientcannot claim that the messagewas notsent .e) Access Control:It is the process ofpreventing an unauthorized use ofresources. This goalcontrols who canhave access to the resources, If one canaccess, under which restrictionsandconditions the access can be(1)Where is the encryption algorithm using key .The opposite of cipher mechanism iscalled decipher (decode) that is the algorithmwhich recovers thecipher text, this method iscalled decryption, in other words it's themechanism of converting"meaningless" data intoreadable data.www.ijert.org(2)207

International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181ETRASCT' 14 Conference ProceedingsAuthentication is the process ofdetermining whether someone is the same personwho really is, such aslogin and password in loginpages while authorization is the process ofensuring that this person has theability to dosomething. Brute force is the attacker who istrying all of the possible keys that may be usedin either decrypt or encrypt information.IV. TYPES OF CRYPTOGRAPHYThere are many types of cryptography, includingcodes, steganography (hidden orsecret writing),and ciphers. Codes rely on codebooks.Steganography relies on different ways tohide ordisguise writing. Ciphers include both computergenerated ciphers and those created byencryptionmethods. The different types of ciphers dependon alphabetical, numerical, computerbased,orother scrambling methods.a) Codes and CodebooksA well-constructed code can representphrases and entire sentences with symbols,suchas five-letter groups, and is often used more foreconomy than for secrecy. A properlyconstructedcode can give a high degree of security, but booksofknowncodes—under conditions of absolute secrecylimits their use toplaces in which the books canbe effectively guarded. In addition, the more acodebook is used,the less secure it becomes.Imagine a codebook with two columns. Inthe first column is a list of all the wordsthat amilitary commander could possibly need to useto communicate. For example, it containsall thepossible geographic areas in a region, allpossible times, and all military terms. In theothercolumn is a list of plain words. To create a codedmessage, the encoder writes down theactualmessage. He then substitutes words in thecodebook by finding matches in thesecondcolumn for the words in the message andusing the new words instead. For example,suppose themessage is Attack the hill at dawnand the codebook contains the following wordpairs: attack bear, the juice, hill orange, at calendar, and dawn open. The encodedmessage wouldread Bear juice orange calendaropen.If the coded message fell into enemy hands,the enemy would know it was in code,butwithout the codebook the enemy would have noway to decrypt the message. Codebookslosesome of their value over time, however. Forexample, if the coded message fell into enemyIJERTThe Key is an input to the encryption algorithm,and this value must be independent of theplaintext, Thisinput is used to transform theplaintext into cipher text, so different keys willyield different cipher text, Inthe decipher side,the inverse of the key will be used inside thealgorithm instead of the key.Computer security it's a generic term fora collection of tools designed to protect any datafrom hackers,theft, corruption, or natural disasterwhile allowing these data to be available to theusers at the sametime. One example of thesetools is the A-vast antivirus program .Network security refers to any activitydesigned to protect the usability, integrity,reliability, and safety ofdata during theirtransmission on a network, Network securitydeals with hardware and software, Theactivitycan be one of the following anti-virus and antispyware, firewall, Intrusion prevention systems,andVirtual Private Networks .Internet Security is measures andprocedures used to protect data during theirtransmission over acollection of interconnectednetworks .while information security is abouthow to prevent attacks, and todetect attacks oninformation-based systems.Cryptanalysis (codebreaking) is the study of principles and methodsof deciphering cipher text withoutknowing thekey, typically this includes finding and guessingthe secrete key, It's a complex processinvolvingstatistical analysis, analytical reasoning, mathtools and pattern-finding, The field ofbothcryptography and cryptanalysis is calledcryptology .Symmetric encryption refers to theprocess of converting plaintext into cipher text atthe sender with thesame key that will be used toretrieve plaintext from cipher text at therecipient. while asymmetricencryption refers tothe process of converting plaintext into ciphertext at the sender with different keythat will beused to retrieve plaintext from cipher text at therecipient .Passive attacks mean that the attackersor the unauthorized parties just monitoring onthe traffic or onthe communication between thesender and the recipient, but not attempting tobreach or shut down aservice, This kind ofattacks is very hard to discover, since theunauthorized party doesn’t leave anytraces. Onthe other hand active attacks mean that theattackers are actively attempting to cause harmtothe network or the data. The attackers are not justmonitoring on the traffic, but they also attempttobreach or shut down the service .www.ijert.org208

International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181ETRASCT' 14 Conference Proceedingshandsand the next day the hill was attacked atdawn, the enemy could link the event to thecodedmessage. If another message containing theword orange were captured, and the followingday,something else happened on the hill, theenemy could assume that orange hill is inthecodebook. Over time, the enemy could puttogether more and more code word pairs,andeventually crack the code. For this reason, itis common to change codes often.d) Computer Ciphers & EncryptionGovernment agencies, banks, and manycorporations now routinely send a great dealofconfidential information from one computer toanother. Such data are usually transmittedviatelephone lines or other nonprivate channels,such as the Internet. Continuing developmentofsecure computer systems and networks willensure that confidential information can besecurelytransferred across computer networks.e) CryptanalysisCryptanalysis is the art of analyzingciphertext to extract the plaintext or the key.Inother words, cryptanalysis is the opposite ofcryptography. It is the breaking ofciphers.Understanding the process of codebreaking is very important when designing anyencryptionsystem. The science of cryptographyhas kept up with the technological explosion ofthe last halfof the 20th century. Current systemsrequire very powerful computer systems toencrypt anddecrypt data. While cryptanalysis hasimproved as well, some systems may exist thatareunbreakable by today’s standards.Today’s cryptanalysis is measured bythe number and speed of computers availabletothe code breaker. Some cryptographers believethat the National Security Agency (NSA) oftheUnited States has enormous, extremely ysis.Thesubstitutionciphersdescribed above are easy to break. Beforecomputers wereavailable, expert cryptanalystswould look at ciphertext and make guesses as towhich letterswere substituted for which otherletters. Early cryptanalysis techniques includedcomputing thefrequency with which letters occurin the language that is being intercepted. Forexample, in theEnglish language, the letters e, s,t, a, m, and n occur much more frequently thando q, z, x, y, andw. So, cryptanalysts look at theciphertext for the most frequently occurringletters and assignthem as candidates to be e, s, t,a, m, and n. Cryptanalysts also know that certaincombinations ofletters are more common in theEnglish language than others are. For example, qand u occurtogether, and so do t and h. The moreciphertext that is available, the better the chancesofbreaking the code.IJERTb) Steganography:Steganography is a method of hiding theexistence of a message using tools suchasinvisible ink, microscopic writing, or hidingcode words within sentences of a message (suchasmaking every fifth word in a text part of themessage).Cryptographersmayapplysteganographyto electronic communications.This application is called transmissionsecurity.Steganography, or sec

network security. This paper covers the various cipher generation algorithms of cryptography which are helpful in network security. Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security

Related Documents:

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

integrating together cryptography and Steganography through image processing. In particular, we present a system able to perform Steganography and cryptography at the same time. In this paper, both Cryptography and Steganography methods are used for data security over the network. IRIS i

basic cryptography concerns secure communication between two parties, while in this course we are interested in cryptographic protocols in multiuser/network context prerequisites: a previous course in cryptography (e.g. C&O 487, Applied Cryptography) is helpful but not required mat

Keywords: network security, cryptography, decryption, encryption Cite This Article: Shyam Nandan Kumar, “Review on Network Security and Cryptography.” International Transaction of Electrical and Computer Engineers System, vol. 3, no. 1 (2015): 1-11. doi: 10.12691/iteces-3-1-1. 1. Introduction Internet has become more and more widespread, if an

sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography. KEYWORDS: Cryptography, Steganography, Encryptio

influence of ideological values on the policies and practices of America’s criminal justice systems. Recently, however, a trend toward critical analysis of the behavior of police, courts, and corrections has emerged that focuses exclusively on ideology as the analytical tool of choice. For example, Barlow (2000), and Bohm and Haley (2001) include extensive discussion of the influence of .