• Corpus ID: 15000521

Network Security Using Cryptographic Techniques

  title={Network Security Using Cryptographic Techniques},
  author={Sumedha Kaushik and Ankur Kumar Singhal},
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element… 
Analysis of Cryptographic Algorithms for Network Security
There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication.
Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
The basics of network security and types of symmetric algorithms and new approach for symmetric encryption algorithm for encryption and decryption of data and the merits of the new proposed algorithm are encompassed.
A Survey on Cryptographic Techniques for Network Security
This paper is to compare the most commonly used algorithms for data encryption and investigates the performance analysis of different algorithms under different settings.
Software Quality Assurance in Network Security Using Cryptographic Techniques
Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.
The aim of this paper is to critically review the studies on networking security, categorizing various attacks and threats and measures that need to be implemented for protection.
Encryption and Decryption Using Bit Operations
The proposed encryption algorithm is illustrated about the comparison of various data samples during encryption and decryption process which results in terms of better performance metrics such as data size, memory, and throughput value.
A Review on the Network Security Related to Wireless Sensor Network
The wireless sensor network is divided into four classes: threats to sensor network security, security requirements, attacks and security, which mean availability, self management, time synchronization, secure localization and authentication.
A Review on DES, AES and Blowfish for Image Encryption & Decryption
This paper discusses and survey DES, AES and Blowfish for Image Encryption and Decryption and suggests some future suggestion which can be useful for image encryption.
A Review on IDEA, AES and Blowfish for Image Encryption and Decryption
This paper discusses and survey IDEA, AES, and Blowfish for Image Encryption and Decryption and suggests some future suggestion which can be useful for image encryption.
A Study on Modern Cryptographic Primitives and Signature Schemes
This paper focuses on the use of modern cryptographic schemes and their importance in digital data communication system.


A Performance Comparison of Data Encryption Algorithms
  • A. Nadeem, M. Javed
  • Computer Science
    2005 International Conference on Information and Communication Technologies
  • 2005
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Performance analysis of stream and block cipher algorithms
  • S. O. Sharif, S.P. Mansoor
  • Computer Science, Mathematics
    2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
  • 2010
This work provides comparison between block and stream cipher algorithms, using different data sizes and key sizes, and shows that stream cipher algorithm in general perform better than block cipher algorithm with regards to CPU time required for encryption.
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
  • A. Murat Fiskiran, R. Lee
  • Computer Science, Mathematics
    2002 IEEE International Workshop on Workload Characterization
  • 2002
This paper describes the operations needed by elliptic-curve analogs of Diffie-Hellman key exchange, ElGamal and the Digital Signature Algorithm for public-key cryptography, for different key sizes and different levels of software optimization, and shows that all these algorithms can be implemented efficiently with a very simple processor.
A New Secure Hash Dynamic Structure Algorithm (SHDSA) for Public Key Digital Signature Schemes
The digital signature standard algorithm (DSSA) given by the NIST has been modified using the proposed SHDSA, designed to satisfy the dynamic structure algorithm with different level of enhanced security and to resist the advanced SHA attacks.
An Ontology for Network Security Attacks
This review is based on standard texts, using well-known concepts, categorizations, and methods to construct a framework which is then used to define an extensible ontology for network security attacks.
Anomaly Detection for Application Level Network Attacks Using Payload Keywords
  • Like Zhang, G. White
  • Computer Science
    2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications
  • 2007
This paper explores how the packet payload can be used for identifying application level attacks and proposes an efficient method to detect payload related attacks based on the profile constructed.
The Rijndael block cipher (AES proposal) : a comparison with DES
The authors analyze the structure and design of new AES, following three criteria: resistance against all known attacks; speed and code compactness on a wide range of platforms; and design simplicity; as well as its similarities and dissimilarities with other symmetric ciphers.
Asymmetric key cryptographic System‖
  • International Journal of Information Technology and Knowledge Management
  • 2011
Network monitoring/Intrusion Detection Systems (IDS)
    A Role-Based Trusted Network Provides Pervasive Security and Compliance -interview with Jayshree Ullal, senior VP of Cisco