Easychair Preprint: Janani Ramesh
Easychair Preprint: Janani Ramesh
№ 7438
Janani Ramesh
February 8, 2022
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
R JANANI
Department of Artificial Intelligence & Data Science, Easwari Engineering College, Chennai, India
ABSTRACT
The paper aims to provide a broad idea about Cryptography and Network Security.
Cryptography is the practice and study of techniques to secure communication in the presence of
adversarial behavior. On the other hand, Network security is the set of rules and configurations designed
to protect the integrity, confidentiality, and accessibility of computer networks and data using both
software and hardware technologies. Cryptography and network security are used to protect network and
data communication take place over wireless networks and data which is stored in our systems.
Cryptography is a network security tactic that is used to protect enterprise information and
communication from cyber threats through the use of codes(encryption) using techniques such as merging
words with images, and other ways to hide information in storage or transit. In this paper, we discussed
about cryptography process, security mechanism, security services, attacks, types of cryptography,
Steganography.
INTRODUCTION
During this pandemic, we all rely upon online for all our needs such as communication,
sharing information, online shopping, net banking, work, storing personal information, etc… so we use
the method called cryptography to secure the information that we share using a network. Network security
is the protection of the access to files and directories in a computer network against hacking, misuse, and
unauthorized changes to the system.[ 1] Network security acts as insurance for the stored resources. An
example of network security is an anti-virus system. There are three components of network
security: hardware, software, and cloud services.
While a vulnerability does not guarantee that a hacker, can easily gain access to our network
information. Cryptography is the branch of network security. Cryptography is origin from the
1
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY PROCESS
❖ Plain text - The messages to be encoded is known as plain content or clear content.
❖ Encryption - The way toward delivering cipher content is called encryption.
❖ Cipher text - The encoded message is called cipher content.
❖ Decryption -The procedure of recovering the plain content from the cipher content
is called decoding[2]
An example of cryptography
2
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
• There is an invertible matrix which is called the encryption matrix or the encoding matrix.
We'll call it matrix B. Since this matrix needs to be invertible, it must be square.
• This could be anything; it’s up to the person encrypting the matrix. I'll use this matrix.
• The unencrypted data is then multiplied by our encoding matrix. The result of this
multiplication is the matrix containing the encrypted data. We'll call it matrix X
3
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
• The message that you would pass on to the other person is the stream of numbers 67, -21, 16. -
8, 51, 27, 52, -26.
SECURITY MECHANISMS
Encipherment
Access Control
Notarization
Data Integrity
Authentication exchange
Bit stuffing
Digital Signature
SECURITY SERVICES
Confidentiality
Confidentiality means that only authorized individuals(the receiver) can view the sent
information. The data being sent over the network can not be accessed by unauthorized
individuals.
4
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
Integrity
Integrity is the assurance that digital information is uncorrupted and can only be accessed
or modified by those authorized to do so. Modification includes writing, changing status,
deleting, creating, and delaying or replaying transmitted messages.
Authentication
Non repudiation
Non-repudiation refers to the assurance that the owner of a signature key pair that was
capable of generating an existing signature corresponding to certain data cannot convincingly
deny having signed the data.
Access control
Access control identifies users by verifying various login credentials, which can include
usernames and passwords, PINs, biometric scans, and security tokens.
Availability
Availability guarantees that systems, applications, and data are available to users when
they need them
.
5
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
ATTACKS
I.SECURITY ATTACKS
1. Interruption- Interruption is an attack on availability. Eg- cutting of a communication
line.
3. Fabrication- Fabrication is the attack that an unauthorized person sends to the receiver without
the knowledge of the sender.
6
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
II.CRYPTOGRAPHIC ATTACKS
1. ACTIVE ATTACKS
a) Masquerade- An unauthorized entity gains the access to the
system.
7
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
2. PASSIVE ATTACKS
8
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
TYPES OF CRYPTOGRAPHY
9
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
Steganography
10
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
APPLICATION OF CRYPTOGRAPHY
1) Digital Currency
2) E-commerce
3) Military purposes
1) In-Flight
11
RESEARCH PAPER ON
CRYTOGRAPHY AND NETWORK SECURITY
CONCLUSION
Today everything is on the internet, thus security plays a very vital role. The older techniques are
easy to attack. So, to keep the data secure cryptography is very important to save our data from
unauthorized users. The key should be very confidential only to the sender and the receiver.
Cryptography is useful for clients for the encryption of information and confirmation of different
clients. Some cryptographic algorithms are used in network security to provide secured
communication.[6] Cryptography and network security is used in data communication over the
internet to provide security.
REFERENCES
1. https://www.cgmoneta.com/cybersecurity#:~:text=Network%20Security%20is%20the%20pr
otection,or%20from%20a%20private%20network.
2. https://www.irjet.net/archives/V7/i4/IRJET-V7I4585.pdf
3. https://www.geeksforgeeks.org/the-cia-triad-in-
cryptography/#:~:text=Confidentiality%20means%20that%20only%20authorized,be%20acce
ssed%20by%20unauthorized%20individuals.
4. https://en.wikipedia.org/wiki/Passive_attack#:~:text=For%20a%20release%20of%20messag
e,contents%20of%20the%20transmitted%20data.&text=When%20the%20messages%20are
%20exchanged,party%20may%20capture%20the%20messages.
5. https://en.wikipedia.org/wiki/Traffic_analysis#:~:text=Traffic%20analysis%20is%20the%20p
rocess,when%20the%20messages%20are%20encrypted.&text=Advanced%20traffic%20anal
ysis%20techniques%20may%20include%20various%20forms%20of%20social%20network%2
0analysis.
6. Krishnamoorthy, Dr, and S. Chidambaranathan. "Clever Cardnovel Authentication Protocol
(NAUP) in Multi-Computing Internet of Things Environs." (2017).
12