Network Security Using Cryptographic Techniques
@inproceedings{Kaushik2012NetworkSU, title={Network Security Using Cryptographic Techniques}, author={Sumedha Kaushik and Ankur Kumar Singhal}, year={2012} }
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element…
No Paper Link Available
41 Citations
Analysis of Cryptographic Algorithms for Network Security
- Computer Science, Mathematics
- 2013
There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication.
Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
- Computer Science
- 2014
The basics of network security and types of symmetric algorithms and new approach for symmetric encryption algorithm for encryption and decryption of data and the merits of the new proposed algorithm are encompassed.
A Survey on Cryptographic Techniques for Network Security
- Computer Science, Mathematics
- 2015
This paper is to compare the most commonly used algorithms for data encryption and investigates the performance analysis of different algorithms under different settings.
Software Quality Assurance in Network Security Using Cryptographic Techniques
- Computer Science, Mathematics
- 2015
Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.
NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW
- Computer Science
- 2017
The aim of this paper is to critically review the studies on networking security, categorizing various attacks and threats and measures that need to be implemented for protection.
Encryption and Decryption Using Bit Operations
- Computer Science, Mathematics
- 2017
The proposed encryption algorithm is illustrated about the comparison of various data samples during encryption and decryption process which results in terms of better performance metrics such as data size, memory, and throughput value.
A Review on the Network Security Related to Wireless Sensor Network
- Computer Science
- 2015
The wireless sensor network is divided into four classes: threats to sensor network security, security requirements, attacks and security, which mean availability, self management, time synchronization, secure localization and authentication.
A Review on DES, AES and Blowfish for Image Encryption & Decryption
- Computer Science, Mathematics
- 2015
This paper discusses and survey DES, AES and Blowfish for Image Encryption and Decryption and suggests some future suggestion which can be useful for image encryption.
A Review on IDEA, AES and Blowfish for Image Encryption and Decryption
- Computer Science, Mathematics
- 2018
This paper discusses and survey IDEA, AES, and Blowfish for Image Encryption and Decryption and suggests some future suggestion which can be useful for image encryption.
A Study on Modern Cryptographic Primitives and Signature Schemes
- Computer Science, Mathematics
- 2016
This paper focuses on the use of modern cryptographic schemes and their importance in digital data communication system.
References
SHOWING 1-10 OF 14 REFERENCES
A Performance Comparison of Data Encryption Algorithms
- Computer Science2005 International Conference on Information and Communication Technologies
- 2005
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Performance analysis of stream and block cipher algorithms
- Computer Science, Mathematics2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
- 2010
This work provides comparison between block and stream cipher algorithms, using different data sizes and key sizes, and shows that stream cipher algorithm in general perform better than block cipher algorithm with regards to CPU time required for encryption.
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
- Computer Science, Mathematics2002 IEEE International Workshop on Workload Characterization
- 2002
This paper describes the operations needed by elliptic-curve analogs of Diffie-Hellman key exchange, ElGamal and the Digital Signature Algorithm for public-key cryptography, for different key sizes and different levels of software optimization, and shows that all these algorithms can be implemented efficiently with a very simple processor.
A New Secure Hash Dynamic Structure Algorithm (SHDSA) for Public Key Digital Signature Schemes
- Computer ScienceProceedings of the Twenty Third National Radio Science Conference (NRSC'2006)
- 2006
The digital signature standard algorithm (DSSA) given by the NIST has been modified using the proposed SHDSA, designed to satisfy the dynamic structure algorithm with different level of enhanced security and to resist the advanced SHA attacks.
An Ontology for Network Security Attacks
- Computer ScienceAACC
- 2004
This review is based on standard texts, using well-known concepts, categorizations, and methods to construct a framework which is then used to define an extensible ontology for network security attacks.
Anomaly Detection for Application Level Network Attacks Using Payload Keywords
- Computer Science2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications
- 2007
This paper explores how the packet payload can be used for identifying application level attacks and proposes an efficient method to detect payload related attacks based on the profile constructed.
The Rijndael block cipher (AES proposal) : a comparison with DES
- Computer ScienceProceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)
- 2001
The authors analyze the structure and design of new AES, following three criteria: resistance against all known attacks; speed and code compactness on a wide range of platforms; and design simplicity; as well as its similarities and dissimilarities with other symmetric ciphers.
Asymmetric key cryptographic System‖
- International Journal of Information Technology and Knowledge Management
- 2011
Network monitoring/Intrusion Detection Systems (IDS)
A Role-Based Trusted Network Provides Pervasive Security and Compliance -interview with Jayshree Ullal, senior VP of Cisco