• Corpus ID: 15551478

Review on Encryption Ciphers of Cryptography in Network Security

@inproceedings{Gupta2012ReviewOE,
  title={Review on Encryption Ciphers of Cryptography in Network Security},
  author={Gunjan Gupta and R. Chawla},
  year={2012}
}
With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential intrusions and attacks. Security of data can be done by a technique called cryptography. So one can say… 

Figures from this paper

A Review on Cryptography, Attacks and Cyber Security
TLDR
This paper will review cryptography with its goals, types and algorithms used for it, Also types of attack used for intrusion and cyber security technology.
A Survey on Performance Analysis of Block Cipher Algorithms
TLDR
A comparison among the commonly used symmetric key cryptography algorithms: DES (Data Encryption standard), Blowfish, TDES (Triple Data Encryption Standard), PRESENT, KLEIN is offered.
Study of Symmetric Cryptography Algorithms
TLDR
This paper has defined and analyzed various cryptographic symmetric algorithms like DES, Triple DES, AES, AES which are used for symmetric key cryptography.
Role of Different Cryptographic Algorithms in Information Security on Web
TLDR
Different algorithms for information security on web are analyzed to provide necessary data security by providing different algorithms.
A Review on Various Methods of Cryptography for Cyber Security
TLDR
An attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users.
Enhancing the Security of Data Using DES Algorithm along with Substitution Technique
TLDR
Substitution technique is added before the DES algorithm to improve the security of DES algorithm using substitution technique, which is the method of encoding by which unit of plaintext are replaced with cipher text.
Efficient Text Data Encryption System to Optimize Execution Time and Data Security
  • Computer Science, Mathematics
  • 2014
TLDR
The aim of the paper is to develop stronger encryption system that results in minimum execution time and maximum security to encrypt the plain text messages.
A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security
  • M. Al-Shabi
  • Computer Science
    International Journal of Scientific and Research Publications (IJSRP)
  • 2019
TLDR
A comparative study for most important algorithms for encryption and decryption of data in all fields in terms of speed (implementation) and security (special keys) determine whether an encryption algorithm is good.
Survey of Various Encryption Techniques for Audio Data
  • M. Kaur
  • Computer Science, Mathematics
  • 2014
TLDR
A study and comparison of basic symmetric encryption standards and a literature survey encryption technique that have been used for encryption on audio data are presented and this suggests a more secure algorithm for audio encryption.
Study on symmetric key encryption: An Overview
TLDR
An overview on symmetric key is provided to provide an overview on asymmetric key design and its applications in cryptography.
...
...

References

SHOWING 1-10 OF 13 REFERENCES
A Performance Comparison of Data Encryption Algorithms
  • A. Nadeem, M. Javed
  • Computer Science
    2005 International Conference on Information and Communication Technologies
  • 2005
TLDR
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
TLDR
A framework called opportunistic encryption is proposed that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints and produces significant improvement in the performance compared to traditional approaches.
Internet and Network Security
TLDR
This paper analyses main problem existed in the current network information security and proposes some solutions from technical aspects, hoping to gradual eliminate network Information security risks through its construction.
Network security: Focus on security, skills, and stability
  • S. Lincke, A. Holland
  • Computer Science
    2007 37th Annual Frontiers In Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports
  • 2007
TLDR
Network security skills emphasize business practices, legal foundations, attack recognition, security architecture, and network optimization, and these skills tend to stabilize network security course(s).
Investigation of feasible cryptographic algorithms for wireless sensor network
  • K. Choi, Jong-In Song
  • Computer Science
    2006 8th International Conference Advanced Communication Technology
  • 2006
TLDR
The RC4 and MD5 turned out to be most suitable algorithms for a wireless sensor network utilizing MICAz-type motes in terms of the total cryptographic processing time used.
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC VLSI DATA
TLDR
An optimized coding for the implementation of Rijndael algorithm for 256 bytes has been developed and the speed factor of the algorithm implementation has been targeted and a software code in verilog which boasts of a throughput of 2.18 Gb/sec have been developed.
A laboratory-based course on internet security
TLDR
This paper discusses the course and explains how others can set up their own labs to teach this course, a laboratory-based course on Internet Security aimed at the senior undergraduate.
Shebani, “Communication Cryptography”,2004
  • RF and Microwave Conference,
  • 2004
Rijndael, the advanced encryption standard
Younus Javed , “ A performance comparison of data Encryption Algorithm ” , Global Telecommunications Conference Workshops , 2004
  • IRACST – International Journal of Computer Networks and Wireless Communications ( IJCNWC )
...
...