Cryptography & Network Security
Cryptography & Network Security
https://doi.org/10.22214/ijraset.2022.48057
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
Abstract: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior.
On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and
accessibility of computer networks and data using both software and hardware technologies. Cryptography and network security
are used to protect network and data communication take place over wireless networks and data which is stored in our systems.
Cryptography is a network security tactic that is used to protect enterprise information and communication from cyber threats
through the use of codes(encryption) using techniques such as merging words with images, and other ways to hide information
in storage or transit. In this paper, we discussed about cryptography process, security mechanism, security services, attacks, types
of cryptography, Steganography.
Keywords: Cryptography, Network security, Encryption, Decryption.
I. INTRODUCTION
During this pandemic, we all rely upon online for all our needs such as communication, sharing information, online shopping, net
banking, work, storing personal information, etc… so we use the method called cryptography to secure the information that we
share using a network. Network security is the protection of the access to files and directories in a computer network against
hacking, misuse, and unauthorized changes to the system. Network security acts as insurance for the stored resources. An example
of network security is an anti-virus system. There are three components of network security: hardware, software, and cloud services.
An example of cryptography
1) Consider the message “RED RUM”
2) A message is converted into a numeric form according to some scheme. The easiest scheme is to let space=0, A = 1 , B=2,... Y
= 25 and Z = 26 For example, the message "Red Rum" would become 18, 5, 4, 0, 18, 21, 13.
3) This data was placed into matrix form. The size of the matrix depends on the size of the encryption key. Let's say that our
encryption matrix (encoding matrix) is a 2 * 2 matrix. Since I have seven pieces of data, I would place that into a 4 * 2 matrix
and fill the last spot with a space to make the matrix complete. Let's call the original, unencrypted data matrix A
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 819
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
4) There is an invertible matrix which is called the encryption matrix or the encoding matrix. We'll call it matrix B. Since this
matrix needs to be invertible, it must be square.
5) This could be anything; it’s up to the person encrypting the matrix. I'll use this matrix.
6) The unencrypted data is then multiplied by our encoding matrix. The result of this multiplication is the matrix containing the
encrypted data. We'll call it matrix X
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 820
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
7) The message that you would pass on to the other person is the stream of numbers 67, -21, 16. 8, 51, 27, 52, -26.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 821
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
V. ATTACKS
A. Security Attacks
1) Interruption: Interruption is an attack on availability. Eg- cutting of a communication line.
3) Fabrication- Fabrication is the attack that an unauthorized person sends to the receiver without the knowledge of the sender.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 822
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
B. Cryptographic Attacks
1) Active Attacks
a) Masquerade: An unauthorized entity gains the access to the system.
b) Replay: Attack in which valid data transmission is maliciously or fraudulently repeated or delayed to produce an unauthorized
effect.
c) Modification of messages: Attack in which part of the message is modified or message is recorded, to produce an unauthorized
effect.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 823
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
d) Denial of Service: A Denial-of-Service attack (DoS attack) is an attack where an attacker attempts to disrupt the services
provided by a host, by not allowing its intended users to access the host from the Internet.
2) Passive Attacks
a) Release of Message Contents: For a release of message content, a telephonic conversation, an e-mail message, or a transferred
file may contain confidential data. When the messages are exchanged neither the sender nor the receiver is aware that a third
party may capture the messages. This can be prevented by the encryption of data.
b) Traffic Analysis: Traffic analysis is the process of intercepting and examining messages to deduce information from patterns
in communication, which can be performed even when the messages are encrypted.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 824
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
2) Hash Functions: A hash function is a mathematical function that converts a numerical input value into another compressed
numerical value and produces a fixed-sized output.
A. Steganography
Steganography is a method in which a secret message is hidden by text, audio, video, images, network. Steganography is also
known as covered writing.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 825
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com
B. Application of Cryptography
1) Digital Currency
2) E-commerce
3) Military purposes
VII. CONCLUSION
Today everything is on the internet, thus security plays a very vital role. The older techniques are easy to attack. So, to keep the data
secure cryptography is very important to save our data from unauthorized users. The key should be very confidential only to the
sender and the receiver. Cryptography is useful for clients for the encryption of information and confirmation of different clients.
Some cryptographic algorithms are used in network security to provide secured communication.[6] Cryptography and network
security is used in data communication over the internet to provide security.
REFERENCES
[1] https://www.cgmoneta.com/cybersecurity#:~:text=Network%20Security%20is%20the%20pr otection,or%20from%20a%20private%20network.
[2] https://www.irjet.net/archives/V7/i4/IRJET-V7I4585.pdf
[3] https://www.geeksforgeeks.org/the-cia-triad-incryptography/#:~:text=Confidentiality%20means%20that%20only%20authorized,be%20acce
ssed%20by%20unauthorized%20individuals.
[4] https://en.wikipedia.org/wiki/Passive_attack#:~:text=For%20a%20release%20of%20messag
e,contents%20of%20the%20transmitted%20data.&text=When%20the%20messages%20are %20exchanged,party%20may%20capture%20the%20messages.
[5] https://en.wikipedia.org/wiki/Traffic_analysis#:~:text=Traffic%20analysis%20is%20the%20p
rocess,when%20the%20messages%20are%20encrypted.&text=Advanced%20traffic%20anal
ysis%20techniques%20may%20include%20various%20forms%20of%20social%20network%2.0analysis.
[6] Krishnamoorthy, Dr, and S. Chidambaranathan. "Clever Cardnovel Authentication Protocol (NAUP) in Multi-Computing Internet of Things Environs." (2017).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 826