Cryptography In Network Security

Read Complete Research Material



Cryptography in Network Security

Abstract

Emergence in technology has introduced the concept of cryptography in network security and this is important because of its needs that have arisen. Considering that security is concerned with the protection of property, it seems natural to establish IT assets for protection. Since there are threats to the protection of information, measures have been developed to address cyber threats. However, research is highly important, and, encryption needs to be done for which the process also needs to be made authentic.

Key Words: Cryptography, Encryption, Symmetric Ciphers, Key Ciphers, Ciphers Hybrid, Data Encryption Standard, Code Caesar, Authentication Process, Pretty Good Privacy

Table of Contents

Introduction1

Discussion2

Threats to the Protection of Information3

Measures to Address Cyber Threats3

Importance of Research4

Cryptography5

Symmetric Ciphers6

Key Ciphers7

Ciphers Hybrids8

Current Technology of the Cryptography and Its Roles in Network Security8

Encryption10

Code Caesar11

Data Encryption Standard (DES)12

AES, IDEA, 3DES, Blowfish12

Public Key Encryption12

Proposal of RSA scheme14

Authentication Process15

Pretty Good Privacy (PGP)16

Limitations of Cryptography18

Conclusion19

Search Strategy Log21

Annotated Bibliography25



Cryptography in Network Security

Introduction

Internet has played a major role in the emergence of communication networks, and this is because it has opened new possibilities for information exchange. At the same time, the increasing threats to the security of information are being transmitted. It is therefore necessary to create different mechanisms intended to make sure that the electronic documents remain confidential and authentic and all are part of a new technology called cryptography. It addresses the issue of computer security, specifically the different variants crypto: symmetrical and asymmetrical. Moreover, the paper explains some key management schemes and public private, RSA and PGP, and addresses some of the limitations of the solutions offered by this new discipline. Known as cryptography or encryption since ancient times, was used in the field of military and military. He stated that the first of the encryption process for the transmission between sectors of the army are of the Pharaohs (Westland, et.al., 2007).

In the present age, there has been an urgent need for the use of this science, "encryption" and linked to the world interconnected via open networks. Since these networks are used to transfer information electronically, both among ordinary people, and between public and private organizations, whether military or civilian. Methods must be kept confidential information. Moroever, technology has made great efforts from all over the world to find the best ways in which they can exchange data with the possibility of non-disclosure of such data. Until today, work and research in the field of encryption because of the continuous and rapid development of computer and the significant growth of networks and in particular the World Wide Web Internet (Westland, 2007).

Discussion

Security is concerned with the protection of property, and it seems natural to establish what IT assets to protect. At first glance, it may be said that these are the hardware, software and data. Among them, those most at risk are those data that depreciate rapidly because its shelf life is usually short and loses their value before the hardware, whose lifetime is estimated at 2 or 3 years, and the software, sometimes, with appropriate ...
Related Ads