0% found this document useful (0 votes)
48 views10 pages

Cryptography & Network Security

Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

Cryptography & Network Security

Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

10 XII December 2022

https://doi.org/10.22214/ijraset.2022.48057
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

Cryptography & Network Security


Madhur Anil Borate1, Ajay Narayan Panhale2, Vijay Narayan Panhale3, Pranjali Gade4, Dr. Sunita Jadhav5
Yashoda Technical Campus, satara, Maharastra-415003

Abstract: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior.
On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and
accessibility of computer networks and data using both software and hardware technologies. Cryptography and network security
are used to protect network and data communication take place over wireless networks and data which is stored in our systems.
Cryptography is a network security tactic that is used to protect enterprise information and communication from cyber threats
through the use of codes(encryption) using techniques such as merging words with images, and other ways to hide information
in storage or transit. In this paper, we discussed about cryptography process, security mechanism, security services, attacks, types
of cryptography, Steganography.
Keywords: Cryptography, Network security, Encryption, Decryption.

I. INTRODUCTION
During this pandemic, we all rely upon online for all our needs such as communication, sharing information, online shopping, net
banking, work, storing personal information, etc… so we use the method called cryptography to secure the information that we
share using a network. Network security is the protection of the access to files and directories in a computer network against
hacking, misuse, and unauthorized changes to the system. Network security acts as insurance for the stored resources. An example
of network security is an anti-virus system. There are three components of network security: hardware, software, and cloud services.

The most common network vulnerabilities:


1) Improperly installed hardware or software
2) Operating systems or firmware that has not been updated
3) Misused hardware or software
4) Poor or a complete lack of physical security
5) Insecure passwords
6) Design flaws in a device’s operating system or the network
While a vulnerability does not guarantee that a hacker, can easily gain access to our network information. Cryptography is the
branch of network security. Cryptography is origin from the Greek word Kryptos meaning hidden, Cryptography is an application of
mathematical concepts and a set of rule-based calculations known as algorithms to convert messages in ways that make it hard to
decode them. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web
browsing on the internet, and protect confidential transactions such as credit card and debit card transactions.

II. CRYPTOGRAPHY PROCESS


1) Plain Text: The messages to be encoded is known as plain content or clear content.
2) Encryption: The way toward delivering cipher content is called encryption.
3) Cipher Text: The encoded message is called cipher content.
4) Decryption: The procedure of recovering the plain content from the cipher content is called decoding.

An example of cryptography
1) Consider the message “RED RUM”
2) A message is converted into a numeric form according to some scheme. The easiest scheme is to let space=0, A = 1 , B=2,... Y
= 25 and Z = 26 For example, the message "Red Rum" would become 18, 5, 4, 0, 18, 21, 13.
3) This data was placed into matrix form. The size of the matrix depends on the size of the encryption key. Let's say that our
encryption matrix (encoding matrix) is a 2 * 2 matrix. Since I have seven pieces of data, I would place that into a 4 * 2 matrix
and fill the last spot with a space to make the matrix complete. Let's call the original, unencrypted data matrix A

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 819
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

4) There is an invertible matrix which is called the encryption matrix or the encoding matrix. We'll call it matrix B. Since this
matrix needs to be invertible, it must be square.
5) This could be anything; it’s up to the person encrypting the matrix. I'll use this matrix.

6) The unencrypted data is then multiplied by our encoding matrix. The result of this multiplication is the matrix containing the
encrypted data. We'll call it matrix X

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 820
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

7) The message that you would pass on to the other person is the stream of numbers 67, -21, 16. 8, 51, 27, 52, -26.

III. SECURITY MECHANISMS


1) Encipherment
2) Access Control
3) Notarization
4) Data Integrity
5) Authentication exchange
6) Bit stuffing
7) Digital Signature

IV. SECURITY SERVICES


The classification of security services are as follows:
1) Confidentiality: Confidentiality means that only authorized individuals (the receiver) can view the sent information. The data
being sent over the network can not be accessed by unauthorized individuals.
2) Integrity: Integrity is the assurance that digital information is uncorrupted and can only be accessed or modified by those
authorized to do so. Modification includes writing, changing status, deleting, creating, and delaying or replaying transmitted
messages.
3) Authentication: Authentication is the process of verifying the identity of a person or device. Identification phase provides a user
identity to the security system. This identity is provided in the form of a user ID. A common example is entering a username
and password when you log in to a website.
4) Non Repudiation: Non-repudiation refers to the assurance that the owner of a signature key pair that was capable of generating
an existing signature corresponding to certain data cannot convincingly deny having signed the data.
5) Access Control: Access control identifies users by verifying various login credentials, which can include usernames and
passwords, PINs, biometric scans, and security tokens.
6) Availability: Availability guarantees that systems, applications, and data are available to users when they need them

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 821
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

V. ATTACKS
A. Security Attacks
1) Interruption: Interruption is an attack on availability. Eg- cutting of a communication line.

2) Interception- Interception is an attack by an unauthorized person.

3) Fabrication- Fabrication is the attack that an unauthorized person sends to the receiver without the knowledge of the sender.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 822
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

B. Cryptographic Attacks
1) Active Attacks
a) Masquerade: An unauthorized entity gains the access to the system.

b) Replay: Attack in which valid data transmission is maliciously or fraudulently repeated or delayed to produce an unauthorized
effect.

c) Modification of messages: Attack in which part of the message is modified or message is recorded, to produce an unauthorized
effect.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 823
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

d) Denial of Service: A Denial-of-Service attack (DoS attack) is an attack where an attacker attempts to disrupt the services
provided by a host, by not allowing its intended users to access the host from the Internet.

2) Passive Attacks
a) Release of Message Contents: For a release of message content, a telephonic conversation, an e-mail message, or a transferred
file may contain confidential data. When the messages are exchanged neither the sender nor the receiver is aware that a third
party may capture the messages. This can be prevented by the encryption of data.

b) Traffic Analysis: Traffic analysis is the process of intercepting and examining messages to deduce information from patterns
in communication, which can be performed even when the messages are encrypted.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 824
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

VI. TYPES OF CRYPTOGRAPHY


1) Symmetric Key Cryptography: Symmetric encryption is an old technique. The sender and the recipient should know the secret
key that is used to encrypt and decrypt all the messages. Symmetric Key Systems are faster and simpler but the problem is that
sender and receiver have to somehow exchange keys securely.

2) Hash Functions: A hash function is a mathematical function that converts a numerical input value into another compressed
numerical value and produces a fixed-sized output.

A. Steganography
Steganography is a method in which a secret message is hidden by text, audio, video, images, network. Steganography is also
known as covered writing.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 825
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XII Dec 2022- Available at www.ijraset.com

B. Application of Cryptography
1) Digital Currency
2) E-commerce
3) Military purposes

C. Application of Network Services


In-Flight
1) Emergency Response Team
2) App Wall
3) Banking
4) Cloud Malware Protection Service
5) Shopping

VII. CONCLUSION
Today everything is on the internet, thus security plays a very vital role. The older techniques are easy to attack. So, to keep the data
secure cryptography is very important to save our data from unauthorized users. The key should be very confidential only to the
sender and the receiver. Cryptography is useful for clients for the encryption of information and confirmation of different clients.
Some cryptographic algorithms are used in network security to provide secured communication.[6] Cryptography and network
security is used in data communication over the internet to provide security.

REFERENCES
[1] https://www.cgmoneta.com/cybersecurity#:~:text=Network%20Security%20is%20the%20pr otection,or%20from%20a%20private%20network.
[2] https://www.irjet.net/archives/V7/i4/IRJET-V7I4585.pdf
[3] https://www.geeksforgeeks.org/the-cia-triad-incryptography/#:~:text=Confidentiality%20means%20that%20only%20authorized,be%20acce
ssed%20by%20unauthorized%20individuals.
[4] https://en.wikipedia.org/wiki/Passive_attack#:~:text=For%20a%20release%20of%20messag
e,contents%20of%20the%20transmitted%20data.&text=When%20the%20messages%20are %20exchanged,party%20may%20capture%20the%20messages.
[5] https://en.wikipedia.org/wiki/Traffic_analysis#:~:text=Traffic%20analysis%20is%20the%20p
rocess,when%20the%20messages%20are%20encrypted.&text=Advanced%20traffic%20anal
ysis%20techniques%20may%20include%20various%20forms%20of%20social%20network%2.0analysis.
[6] Krishnamoorthy, Dr, and S. Chidambaranathan. "Clever Cardnovel Authentication Protocol (NAUP) in Multi-Computing Internet of Things Environs." (2017).

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 826

You might also like