Network security and Cryptography
DOI:
https://doi.org/10.59367/eeqd1231Keywords:
Cryptography, encrypt and decrypt, Cryptanalysis, Network SecurityAbstract
With the arrival of web and ecommerce applications and social networks across the world generate huge amount of data. Network Security is the most extreme issue to guarantee safe transmission of data through the web. As large amount of user connect to internet it is attracted by huge number of cyber-attacks. Cryptography is the method of using mathematical algorithms to encrypt and decrypt the information. Store data or transfer it across unconfident networks so that it cannot be view by anyone except the conscious recipient. While cryptography is the technique of protecting data, cryptanalysis is the science of surveying and breaking secure conversation. It is basically used to convert the plain text into cipher text .In this paper we provide an overview on Network Security and Cryptography.
References
Vaishnavi B. Savant, Rupali D. Kasar ― Research Journal of Engineering and
Technology 12 (4), 110-114, 2021
Sarita Kumari, ― A research Paper on Cryptography Encryption and Decryption‖
International Journal Of Engineering And Computer Science, 2017
https://en.wikipedia.org/wiki/Cryptography
Jangala. Sasi Kiran M. Anusha, A.Vijaykumar, M.Kavya ―Cryptography: The Science of Secure Communication‖ International Journal of Computer Science and Network Security (IJCSNS) 2016.
Dr.Sandeep Tayal, Dr.Nipin Gupta, Dr.Pankaj Gupta, Deepak Goyal, Monika Goyal, ―A Review paper on Network Security and Cryptography‖ Advances in Computational Sciences and Technology ISSN, 2017.
IEEE Standard P1363.1, ―IEEE standard specification for public key cryptographic techniques based on hard problems over lattices‖, 2009.
ShyamNandan Kumar, ―Review on Network Security and Cryptography‖ in International Transaction of Electrical and Computer Engineers System, 2015, Vol. 3, No. 1, 1-11
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.