Authors
Aman Sharma, Prakhar Saxena
Abstract
In information and communication technology, a modern ear of networking and wireless networks has been come in which security is an important factor. Now, the exchange and transmitting of information through the internet and other communication medium is common due to which the vulnerability of the information is increased. To reduce the chance of threatening of data, information security plays a vital role. In information security, the process of cryptography technique provides the security to the network. It protects the data or information from the unauthorized user and give the guarantee that the contents of a message are transmitted with confidentiality and it would not be changed. Various techniques of cryptography has been emerged to obtain secure communication. In cryptography, there are two types of techniques; symmetric and asymmetric key encryption. The secret data which is transferred over electrical cable is very sensitive. It can be accessed as the purpose of malignant. This paper discuss about the cryptographic technique with its objective, principle and types. Keywords: Cryptography, Encryption, Keys, Confidentiality
Introduction
In recent time, the information of technology applications is protected by the cryptography. For some applications such as ecommerce, e-mail, e-banking, medical databases and so on, information security has been made an important issue. All these information need the exchange of private information. This private information can be hacked by the hacker and modified by change the meaning of message. So, protecting the information or data, many techniques have been developed. In which cryptography plays a vital role.
Cryptography is a study of techniques that is used for securing the information from the third person. It involves the generation of codes that allows the information secure in a secret way. The word of cryptography was came from Greek word ‘kryptos’ means hidden and ‘graphein’ means writing. In general term, cryptography is the exercise and study of hidden writing or the science of text or message encryption and decryption. It is also defined as the art of concealing information that has been practiced. In early time, it is done in the form of secret writing which was written with the help of lemon and other biological fluids and generated by heat. (AbuTaha et al., 2014; Agrawal et al., 2014)
References
AbuTaha, Mohammed, et al. “Survey Paper: Cryptography is the Science of Information Security.” International Journal of Computer Science and Security (IJCSS), vol. 5, no. 3, 2011, pp. 288–309.
Advantages and Disadvantages of Cryptosystems. www.bing.com/cr?IG=57996A2013DE44CDA9E720BFC4FD27FD&CID=15135A45447563883FE4565C45886238&rd=1&h=yeVZGooLvj-0KCUoHC3ReKpU_e1EWx_k83O0qMMyoD8&v=1&r=http://www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf&p=DevEx.LB.1,5516.1.
Agrawal, Vikas, et al. “Analysis and Review of Encryption and Decryption for Secure Communication.” International Journal of Scientific Engineering and Research (IJSER), vol. 2, no. 2, Feb. 2014, pp. 1–3.
Amalraj, A. Joseph, and J. John Raybin Jose. “A Survey Paper on Cryptography Techniques.” International Journal of Computer Science and Mobile Computing, vol. 5, no. 8, Aug. 2016, pp. 55–59.
Dhiman, Reema. “Image Encryption Techniques: A Literature Review.” International Journal of Advanced Research in Computer Science, vol. 8, no. 7, 2017, pp. 239–244.
Duong, Thai, and Juliano Rizzo. “Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET.” 2011 IEEE Symposium on Security and Privacy, 2011.
Egele, Manuel, et al. “An Empirical Study of Cryptographic Misuse in Android Applications.” Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security - CCS 13, 2013.
Joshi, Mukund R., and Renuka Avinash Karkade. “Network Security with Cryptography.” International Journal of Computer Science and Mobile Computing, vol. 4, no. 1, Jan. 2015, pp. 201–204.
Suguna, S., et al. “A Study on Symmetric and Asymmetric Key Encryption Algorithms.” International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 4, Apr. 2016, pp. 27–31.
Tayal, Sandeep, et al. “A Review Paper on Network Security and Cryptography.” Advances in Computational Sciences and Technology, vol. 10, no. 5, Nov. 2017, pp. 763–770.
Toshihiko, OKAMURA. “Lightweight Cryptography Applicable to Various IoT Devices.” NEC Technical Journal, vol. 12, no. 1, Oct. 2017, pp. 67–71.
How to cite this article?
APA Style | Sharma, A. and Saxena, P. (2019). Cryptography: A Way to Secure Network Information. Academic Journal of Information Security, 1(1), 11-15. |
Chicago Style | |
MLA Style | |
DOI | |
URL |