Emergence in technology has introduced the concept of cryptography in network security and this is important because of its needs that have arisen. Considering that security is concerned with the protection of property, it seems natural to establish IT assets for protection. Since there are threats to the protection of information, measures have been developed to address cyber threats. However, research is highly important, and, encryption needs to be done for which the process also needs to be made authentic.
Key Words: Cryptography, Encryption, Symmetric Ciphers, Key Ciphers, Ciphers Hybrid, Data Encryption Standard, Code Caesar, Authentication Process, Pretty Good Privacy
Table of Contents
Introduction1
Discussion2
Threats to the Protection of Information3
Measures to Address Cyber Threats3
Importance of Research4
Cryptography5
Symmetric Ciphers6
Key Ciphers7
Ciphers Hybrids8
Current Technology of the Cryptography and Its Roles in Network Security8
Encryption10
Code Caesar11
Data Encryption Standard (DES)12
AES, IDEA, 3DES, Blowfish12
Public Key Encryption12
Proposal of RSA scheme14
Authentication Process15
Pretty Good Privacy (PGP)16
Limitations of Cryptography18
Conclusion19
Search Strategy Log21
Annotated Bibliography25
Cryptography in Network Security
Introduction
Internet has played a major role in the emergence of communication networks, and this is because it has opened new possibilities for information exchange. At the same time, the increasing threats to the security of information are being transmitted. It is therefore necessary to create different mechanisms intended to make sure that the electronic documents remain confidential and authentic and all are part of a new technology called cryptography. It addresses the issue of computer security, specifically the different variants crypto: symmetrical and asymmetrical. Moreover, the paper explains some key management schemes and public private, RSA and PGP, and addresses some of the limitations of the solutions offered by this new discipline. Known as cryptography or encryption since ancient times, was used in the field of military and military. He stated that the first of the encryption process for the transmission between sectors of the army are of the Pharaohs (Westland, et.al., 2007).
In the present age, there has been an urgent need for the use of this science, "encryption" and linked to the world interconnected via open networks. Since these networks are used to transfer information electronically, both among ordinary people, and between public and private organizations, whether military or civilian. Methods must be kept confidential information. Moroever, technology has made great efforts from all over the world to find the best ways in which they can exchange data with the possibility of non-disclosure of such data. Until today, work and research in the field of encryption because of the continuous and rapid development of computer and the significant growth of networks and in particular the World Wide Web Internet (Westland, 2007).
Discussion
Security is concerned with the protection of property, and it seems natural to establish what IT assets to protect. At first glance, it may be said that these are the hardware, software and data. Among them, those most at risk are those data that depreciate rapidly because its shelf life is usually short and loses their value before the hardware, whose lifetime is estimated at 2 or 3 years, and the software, sometimes, with appropriate ...