- Network Security & Cryptography
ABSTRACT
Imagine the situation that you are sending a file to your friend, which contains sensitive data and is to be protected from disclosure. A third person gains unauthorized access to monitor the transmission and is able to modify the contents of the file. Consider another situation where instead of modifying the contents the third person constructs a new file and forwards it to your friend as if it had come from you. So neither your data remains protected nor will your friend get the correct data. It is not surprising to face such kind of problems, since as the network is growing day by day many such problems related to security of data are coming into picture.
So, there is a need of proper mechanism, which will ensure the security of data during its transmission over the network.The focus of the paper is on network security. Network security is a complicated subject, historically only tackled by well-trained and experienced experts.
One way to provide security is cryptography. Cryptography is science of writing secret code of using mathematics to encrypt and decrypt data.
The main objective of this paper starts with the cryptography terminology and provides a brief overview of various types of cryptographic algorithms such as DES and RSA. We also explain the implementation of symmetric encryption algorithm and finally the applications of cryptography.
So, there is a need of proper mechanism, which will ensure the security of data during its transmission over the network.The focus of the paper is on network security. Network security is a complicated subject, historically only tackled by well-trained and experienced experts.
One way to provide security is cryptography. Cryptography is science of writing secret code of using mathematics to encrypt and decrypt data.
The main objective of this paper starts with the cryptography terminology and provides a brief overview of various types of cryptographic algorithms such as DES and RSA. We also explain the implementation of symmetric encryption algorithm and finally the applications of cryptography.
Download
ABSTRACT
- Touchscreen Technology