Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
- We're Hiring!
- Help Center
Review on Network Security and Cryptography
Science and Education Publishing
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-criminals. It comprises authorization of access to information in a network, controlled by the network administrator. The task of network security not only requires ensuring the security of end systems but of the entire network. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.
Nowadays the applications like Internet and networks are growing very fast, thereby the importance and the value of the exchanged data over the internet or other media types are increasing. For secure communication the cryptography is essential, therefore we have various cryptography algorithms for securing the data over internet. This paper discuss the state of the art for a broad range of cryptographic algorithms that are used in networking applications. A comparison table is created for various cryptography algorithms used as per the requirement on different networks.
Cryptography means secret writing. When the data are transferred from sender to receiver over the network through information channel any third parties can intensively read and may modify the data. Here in this paper we elaborate how cryptography will help to secure the data between authorized people. In order to transfer secure data the data will convert to unreadable form before transmitting to the channel. The cryptography applications range have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) This paper also provides a detailed description of cryptography techniques in Symmetric encryption and a public key cryptography algorithm RSA in Asymmetric encryption.
This paper aims to provide broad view of usage of cryptography in network security. Cryptography is defined as the science of protecting the data. On other hand network security is the process of keeping the information private, secret and secure from unauthorized and illegal access. Cryptography and network security is used to protect network and data communication takes place over wireless network and data which is stored in our systems. Security in this modern scenario has become a more and more sensible and critical issue, because the usage of computers and data networks go on increasing. Network security and cryptography is the subject which provides solutions to protect our information and data in digital form and to avoid security attacks and offers security services. Cryptography and network security is used in various applications like banking, shopping, government agencies, organization, military, secret services, enterprises, business, and in daily lives of peoples. In Cryptography various techniques and algorithms are used to provide security to networks and data. In this paper, we discussed about various encryption and decryption techniques, cryptographic principles, cryptosystem types and cryptographic model and its algorithm. There are six main security services which are availability, confidentiality, authentication, integrity, non-repudiation and access control. There are various security threats for our information like interception, interruption, unauthorized access and modification.
International Journal for Recent Development in Science & Technology
Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.
International Journal of Recent Research Aspects ISSN 2349-7688
— Cryptography plays a vital role in information security system against various types of attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decrypted by party those possesses the associated key. The two important characteristics that identify and differentiate encryption algorithms from another are their capability to secure the protected data against attacks and their speed and effectiveness in securing the data. Cryptography is method that provides the security mechanism in timely driven fashion. Main objective of this paper is to compare the most commonly used algorithms for data encryption. Main concern in this paper is the performance analysis of different algorithms under different settings.
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
Today the use of computers in every one life is a common and easy way to improve day to day life and to lead the community at large to nurture the benefits of modern technologies, but this common path needs security, in its operations. In the early part of 21st Century computer networks were used as a daily tool for a human being for sending e-mails, making online transactions, sharing devices. The art of secret writing is 'CRYPTOGRAPHY', which enables a secured communication between two people over an insecure channel in such a way that the other opponents in the path cannot harm the communicators .This article throws light on process of sharing the information to a form that will be unintelligible to an unintended person by symmetric and asymmetric cryptography. It helps to understand the creation of basic 'CRYPTOSYSTEM', and also focus on the difficulties and challenges in use of cryptography in network security ,with a suggested solution on the problem .The sender and recipient may use same key and encryption /decryption algorithm to encrypt /decrypt given data or may use different key in public key cryptography. All secure data transactions including defence, net payment, access control, business and e-commerce apply cryptography in their operations to safeguard their interests. The use of cryptography technique is the reliable modern tool to build a fair system of confidentiality, integrity and control access, availability & authentication of data. The art and science of concealing the message to introduce secrecy in information security is Cryptography. As the cipher text is public and attackers can get the information and in asymmetric cryptography it require more processing power and computational time we present ECC and quantum computational algorithm.
Daniel L Calloway
This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play in the future relative to security. This review addresses cryptography around the central theme of the security that it provides or should provide individuals, corporations, and others in the modern age of computing technology, networking, and Web-based ecommerce. By reviewing both scholarly and non-scholarly works, it is our objective to make a case that continuing research into the use of cryptography is paramount in preserving the future of electronic data security and privacy as well as the continuing development of Web-based applications that will permit the growth of ecommerce business worldwide to be conducted over the Internet.
International Journal of Engineering Research and Technology (IJERT)
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
Computer and Network Security
Recent Advances in Cryptography and Network Security
Prof. Pinaki Mitra
International journal of engineering research and technology
Journal of Ultra Computer and information Technology
WARSE The World Academy of Research in Science and Engineering
2021 International Conference on Cyber Security and Internet of Things (ICSIoT)
Journal of Computer Science IJCSIS
Handbook of Research on Information Security and Assurance
Journal of Information Security and Applications
Omar G . Abood
ACM Computing Surveys (CSUR)
IJSRD - International Journal for Scientific Research and Development
Ahtisham Hashmi , Ravi Kumar Choubey
Dr. Ashraf Aboshosha , Alaa Sheta , Amany Sarhan
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT
Simulation in Computer Network Design and …
Rajan Shankaran , Atilla Elçi
international journal for research in applied science and engineering technology ijraset
- We're Hiring!
- Help Center
- Find new research papers in:
- Health Sciences
- Earth Sciences
- Cognitive Science
- Computer Science
- Academia ©2023
Importance of Cryptography in Network Security
- Change Username/Password
- Update Address
- Payment Options
- Order History
- View Purchased Documents
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2023 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
- Our Promise
- Our Achievements
- Our Mission
- Proposal Writing
- System Development
- Paper Writing
- Paper Publish
- Synopsis Writing
- Thesis Writing
- Survey Paper
- Conference Paper
- Journal Paper
- Empirical Paper
- Journal Support
- Latest Research Topics in Cryptography and Network Security
Network security term itself clearly depicts you that it is designed to protect the entire network from the authorized access in time of digital/analog data communication . The technologies used in network security are guaranteed to provide data confidentiality, authenticity, and availability against security risks throughout the communication.
This article is intended to display to you about latest research topics in Cryptography and Network Security with its current research areas!!!
Generally, the security mechanisms have two constituents to shield the network information . Below, we have listed the working principles of those constituents for your reference.
- Add the security over the information. For instance , implement the encryption method over the transmitting message. So that information will be converted into a new unreadable format where the illegal user cannot access the original message until it is decrypted . Further, it also includes the code information in the header, which depends on the content of the message. Thus, it is used to detect/verify the original sender of the message.
- In the case of sensitive data, it is necessary to share the information between only sender and receive r. The opponent party should not know the information under any conditions. In order to achieve this motive, the encryption key is used to convert the original plain text into scrambled text by the sender. Similarly, the decryption key is used to convert scrambled text into original plain text by the receiver.
For any measure, the main goal is to identify and prevent security attacks with rescue abilities . Most probably, the security measures are based on cryptographic technologies. If you take any security mechanism, then you may find the trace of encryption / some kind of data transformation .
Overview of Cryptography and Network Security
Cryptography is basically classified into two major techniques, and they are cryptography and cryptanalysis. On the one hand, cryptography is the process of protecting or hiding the information through intelligent masking techniques (i.e., code the information). On the other hand, cryptanalysis investigates how the ciphertext is converted into plain text and vice-versa.
Due to its incredible security concern and contribution, it is largely used in many research domains and areas to improve its security aspects. Some of the current research aspects of cryptography are given as below,
- Hashing Techniques
- Public-Key Cryptography
- Key Distribution and Management
- Symmetric-Key Cryptography
- Real-time Cryptography Applications
- Cryptographic Security Protocols / Standards
- Quantum Cryptography
- Biological Cryptography
- And many more
Network Security is intended to develop various levels of shielding measures with an extended security scope. These measures are worked in the principle of identifying/predicting network security threats/risks to take immediate defensive response/actions. As a result, it protects the entire network information. The identification, prediction, and defensive response measures are essential to execute based on specific security policies . Few of the current research directions of the network security are given as below,
- Incident Response System
- Intrusion Detection and Prevention Schemes
- Trusted Heterogeneous Networks
- Network Security Threats, Risks and Vulnerabilities
- Network Protection against Internet Attacks
- Communication Technologies and Protocol Security
We hope you are clear on the fundamentals of cryptography and network security . Now, we can see the recent research areas of cryptography and network security . In truth, our research team is presently creating unbelievable contributions through our latest research topics in cryptography and network security . So, you can confidently hold your hands with us to create amazing research work.
Research Areas in Network Security
- Heterogeneous Communication Networks
- Cognitive Radio based Mobile Communication
- Information Security in Self-Organized Network
- Named data and Data / Human Centric Network
- Ultra-band Wireless Sensor Network (UWSN)
- Wireless Body Area Network (WBAN)
- Cognitive Radio-Wireless Sensor Network (CR-WSN)
- Software Defined-Wireless Sensor Network (SD-WSN)
- Hybrid ad hoc
- Vehicular Ad hoc
- Cognitive Radio Ad hoc
- Underwater Network
- MANET / iMANET / WANET
- Fog / Cloud-Radio Access Network (Fog-RAN / cloud-RAN)
- Advance Cellular Networks (4G, LTEA-Pro, 5G, Beyond 5G and 6G)
Here, we have given you the achievements of cryptography while applying them in network security. For any cryptographic methods , the following are determined as the key objectives for reaching high network security .
What are the objectives of cryptography in network security?
- Detect the attack which definitely create worst impact
- Screen the network to monitor the behavior and activities of intruders
- Detect the attack and analyze their effect on network after execution
- Analyze the origin and root cause of the threats / attacks
- Conduct in-depth inspection on different levels of attacks
Our development team is sophisticated with experienced developers, so we can solve any level of a complex issue. Here, we have given you the widely used cryptographic algorithms, classified as low-cost, lightweight, and ultra-lightweight characteristics .
Major Classifications of Cryptography Algorithms
- Hardware Development – 2000 Gates
- Device Capacity – AT mega 128
- Ciphers – ECC, Grain / 128, MIBS TWINE, PRESENT, etc.
- Software Development – 8kb RAM and 4kb ROM
- Hardware Development – 3000 Gates
- Device Capacity – ATiny 45, AT mega 128 and 8051 micontroller
- Ciphers – ECC, DEXL, SOSEMANUK, CLEFIA, etc.
- Software Development – 8kb RAM and 32kb ROM
- Hardware Development – 1000 Gates
- Device Capacity – ATiny 45 and 8051 microntroller
- Ciphers – KATAN, Hummingbird, Fruitv2, QTL, etc.
- Software Development – 256 B RAM and 4kb ROM
Research Gaps of Cryptography
Though many lightweight ciphers are introduced in cryptography, it lacks performance in any of these aspects, such as high security and low ( resource utilization, delay, internal overhead states , etc.).
Below, we can see the challenges in lightweight cryptographic techniques such as elliptic curve cryptography, stream ciphers, hash methods, and block ciphers . Our developers will pay extra attention to the following for framing lightweight security measures that assure high performance in all aspects.
CRYPTOGRAPHY LATEST ALGORITHMS
- Decrease the usage of energy / power
- Minimize the needs of memory
- Enhance the speed of computation
- Optimize the Group arithmetic and Prime Fields (PF)
- Minimize the length of the key
- Decrease the chip area / size
- Minimize the Key / IV setup rotations
- Reduce the internal state / condition
- Decrease the message and output size
- Make the simpler cycles
- Model the simple key schedules
- Decrease the key and block size for fast execution
Our current study on cryptographic techniques found that ECC is less preferable than AES because of its speed. However, ECC is considered a slow process; it meets the requirement of ultra-lightweight cryptography . Our developers are glad to share the trick to increase the ECC speed for your information. If the memory needs are minimized, then eventually, it also minimizes the ROM and RAM needs. As a result, ECC gains the first priority among others. Below, we have given the list of research fields that offer a sophisticated platform for developing cryptographic techniques enabled network security applications.
Applications of Cryptography based Network Security
- Internet of Things
- Industrial Internet of Things
- Haptic / Tactile Internet of things
- Internet of Bio / Nano-Things
- Vehicle to Infrastructure
- Autonomous Vehicle Driving System
- Deep-Sea Objects Identification and Analysis
- Healthcare and Telemedicine
- Remote Patient Monitoring using Wearable Devices
- 360 Degree and Ultra-High Definition Videos
- Virtual and Augmented Reality
- Space Travel and Satellite Communication
- WBAN based Digital Sensing and Visualization
- Smart Environment Modeling (smart city / home / office, etc.)
Further, we have listed the top-demanding research topics in cryptography and network security . The below-given research ideas are just the samples. More than this, we have a copious amount of novel research notions. If you have your own ideas and are looking for the best guidance to craft network security research topics , we are also ready to support you in your need.
Top 10 Latest Research Topics in Cryptography and Network Security
- Secure Cross-Layer Architecture Design
- Security for Critical Cyber Physical Systems
- Insider Threats Prediction and Detection Systems
- Modeling of Security Assured Smart Grid System
- Data Hiding, Survivability and Watermarking
- SDN-NFV based High Performance Security System
- Security Protocol Performance Assessments
- Design and Development of Ultra-Efficient Security Models
- Security in Cloud Services and Applications
- Identification of Multi-level Security Threats with Preventive Measures
- Improved Privacy and Security Solutions in Wireless Communications
From a development perspective, now we can see how the network security models are designed, tested, and assessed . In order to estimate the efficiency of the network security model, we can use the following for real-time development.
How do we evaluate the performance of network security?
- Analytical Models
- Real-time Tests
Further, we have also listed the important tools used for network security projects developments . All these tools are specialized to meet particular requirements of the network security model. For instance: Wireshark is used to generate and analyze the network packets . Likewise, we have given the other important tools and technologies for your awareness.
- Test the vulnerabilities of the of the network at different angles through continuous scan and access
- Probe the available susceptibilities in the application and take immediate response to that events
- Analyze and troubleshoot the packets, network, applications, communication protocols and more
- Collect whole information of network including OS, computer systems, and network entities
Next, we can see about the secure transmission approaches. Basically, the performance metrics have a key player role in elevating the design of transmission approaches. However, it has high importance, the modeling of physical layer security cause different kinds of technical issues . So, it is critical to select the suitable metrics for improving reliability, resource cost (low power), transmission efficiency, and energy efficiency of the transmission approaches . Our developers will help to attain your goal in the following aspects of transmission approaches.
- Reliability – compute in terms of privacy outage probability and capacity
- Power cost – compute in terms of power usage (low) for promising QoS
- Transmission Efficiency – compute in terms of maximum possible privacy degree and capacity
- Energy Efficiency – compute in terms of amount of energy required for one bit transmission and amount of bits transmitted in one unit of energy
As mentioned earlier, the above-specified metrics are sure to increase the performance of transmission approaches. And, these metrics are adopted in the time of system modelling . Further, we have improved our skills in all security-related strategies based on recent research requirements.
Last but not least, if you want to be familiar with more updates on the latest research topics in cryptography and network security , then communicate with our team. We will surely assist you in fulfilling your needs for a fine-tuning research career.
MILESTONE 1: Research Proposal
Finalize journal (indexing).
Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.
Research Subject Selection
As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.
Research Topic Selection
We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other
Literature Survey Writing
To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)
Case Study Writing
After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.
Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.
Writing Research Proposal
Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)
MILESTONE 2: System Development
Fix implementation plan.
We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.
We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.
Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.
Develop Proposal Idea
We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.
We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.
Graphs, Results, Analysis Table
We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.
For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.
MILESTONE 3: Paper Writing
Choosing right format.
We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.
Collecting Reliable Resources
Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.
Writing Rough Draft
We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources
Proofreading & Formatting
We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on
Native English Writing
We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.
Scrutinizing Paper Quality
We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).
We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.
MILESTONE 4: Paper Publication
Finding apt journal.
We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.
Lay Paper to Submit
We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.
We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.
Paper Status Tracking
We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.
Revising Paper Precisely
When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.
Get Accept & e-Proofing
We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.
Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link
MILESTONE 5: Thesis Writing
Identifying university format.
We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.
Gathering Adequate Resources
We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.
Writing Thesis (Preliminary)
We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.
Skimming & Reading
Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.
Fixing Crosscutting Issues
This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.
Organize Thesis Chapters
We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.
Writing Thesis (Final Version)
We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.
How PhDservices.org deal with significant issues ?
1. novel ideas.
Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.
To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.
3. Confidential Info
We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.
- Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
- Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.
CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.
Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.
5. No Duplication
After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.
I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.
I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.
It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.
My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.
I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.
Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.
I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.
You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.
These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.
Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.
I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.
Trusted customer service that you offer for me. I don’t have any cons to say.
I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!
- Abdul Mohammed
Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.
I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.
I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!
I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.
- Ghulam Nabi
I am extremely happy with your project development support and source codes are easily understanding and executed.
Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.
I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!
- International Journal of Engineering Research & Technology (IJERT)
- Mission & Scope
- Editorial Board
- Peer-Review Policy
- Publication Ethics Policy
- Journal Policies
- Join as Reviewer
- Conference Partners
- Call for Papers
- Journal Statistics – 2021-2022
- Submit Manuscript
- Journal Charges (APC)
- Register as Volunteer
- Upcoming Conferences
- CONFERENCE PROCEEDINGS
- Thesis Archive
- Thesis Publication FAQs
- Thesis Publication Charges
- Author Login
- Reviewer Login
ETRASCT - 2014 (Volume 2 - Issue 03)
Review on Cryptography in Network Security
- Article Download / Views: 1,422
- Total Downloads : 17
- Authors : Mitesh Sharma
- Paper ID : IJERTCONV2IS03026
- Volume & Issue : ETRASCT – 2014 (Volume 2 – Issue 03)
- Published (First Online): 30-07-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
M.E. Scholar, Department of Computer Science and Engineering
M.B.M. Engineering College Jai NarainVyas University, Jodhpur
AbstractWith the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptographic operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receivers hash function value is equivalent to the senders, the integrity of the message is assured. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is
Nowadays, cryptography plays a major role in protecting the information of technology applications. Information security is an important issue, for some applications. Have the top priority such as ecommerce, e-banking, e-mail, medical databases, and so many more, all of them require the exchange of private information. Cryptography is the transformation of readable and understandable data into a form which cannot be understood in order to secure data. Cryptography refers exactly to the methodology of concealing the content of messages, the word cryptography comes from the Greek word "Kryptos", that means hidden, and "graphikos" which means writing .
For example, let us consider a person named Alice a sender who wants to send adata message which has a length of characters to a receiver called Bob. Alice uses an unsecurecommunication channel. Which could be a telephone line , computer network, or any other channel. If themessage contains secret data,
vulnerable to potential intrusions and attacks. Security of data can be done by a technique called cryptography. So one can say that cryptography is an emerging technology, which is important for network security. This paper covers the various cipher generation algorithms of cryptography which are helpful in network security. Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e- commerce.
Keyword:Plain Text, Cipher Text, Attacks, Cryptography, Symmetric Encryption, ASymmetricEncryption ,Hash Algorithm.
they could be intercepted and read by hackers. Also they may change ormodify the message during its transmission in such a way that Bob would not be able to discover thechange. In this survey a various ways of encryption is viewed and have been compared ,a lot ofexamples have been provided .
Network security is a new and fast moving technology and as such, is still being defined. When considering the desired learning outcomes of such a course, one could argue that a network security analyst must be capable of analyzing security from the business perspective in order to adhere to recent security legislation, and from the technical perspective in order to understand and select the most appropriate security solution. Network security originally focused on algorithmic aspects such as encryption and hashing techniques. While these concepts rarely change, these skills alone are insufficient to protect computer networks. As crackers hacked away at networks and systems,
courses arose that emphasized the latest attacks. Currently, many educators believe that to train people to secure networks, they must also learn to think like a cracker. The following background information in security helps in making correct decisions: Attack Recognition, Encryption techniques, Network Security Architecture, Protocol analysis, Access control list and vulnerability. For Network security cryptography is present. In cryptography data that can be read and understood without any special measures is called plaintext or clear text.
The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called cipher text. We use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting cipher text to its original plain text is called decryption. In cryptography three types of algorithms are present. Symmetric key algorithm, asymmetric key algorithm and hash function.
By using cryptography many goals can be achieved, These goals can be either all achieved at the sametime in one application, or only one of them, These goals are:
Confidentiality:It is the most important goal, that ensures that nobody can understand thereceived message except the one who has the decipher key.
Authentication:It is the process of proving the identity, that assures the communicating entity isthe one that it claimed to be, This means that the user or the system can prove their ownidentities to other parties who dont have personal knowledge of their identities. (The primaryform of host to host authentication on the Internet today is name-based or address-based; andboth of them are notoriously weak).
Data Integrity:Its ensures that the received message has not been altered in any way from itsoriginal form, This can be achieved by using hashing at both sides the sender and the recipientin order to create a unique message digest and compare it with the one that received.
Non-Repudiation:It is mechanism used to prove that the sender really sent this message, ,andthe message was received by the specified party, so the recipient cannot claim that the messagewas not sent .
Access Control:It is the process of preventing an unauthorized use of resources. This goalcontrols who can have access to the resources, If one can access, under which restrictions andconditions the access can be
occurred, and what is the permission level of a given access.
IMPORTANCE AND APPROACHES
The information that we need to hide, is called plaintext , Its the original text, It could be in a form ofcharacters, numerical data, executable programs, pictures, or any other kind of information, The plaintextfor example is the first draft of a message in the sender before encryption, or it is the text at the receiverafter decryption.The data that will be transmitted is called cipher text , it's a term refers to the string of "meaningless"data, or unclear text that nobody must understand, except the recipients. it is the data that will betransmitted Exactly through network, Many algorithms are used to transform plaintext into cipher texts
Cipher is the algorithm that is used to transfom plaintext to cipher text, This method is called encryptionor enciphers (encode), in other words, it's a mechanism of converting readable and understandable datainto "meaningless" data, and it is represented as follows:
Where is the encryption algorithm using key .
The opposite of cipher mechanism is called decipher (decode) that is the algorithm which recovers thecipher text, this method is called decryption, in other words it's the mechanism of converting"meaningless" data into readable data.
The Key is an input to the encryption algorithm, and this value must be independent of the plaintext, Thisinput is used to transform the plaintext into cipher text, so different keys will yield different cipher text, Inthe decipher side, the inverse of the key will be used inside the algorithm instead of the key.
Computer security it's a generic term for a collection of tools designed to protect any data from hackers,theft, corruption, or natural disaster while allowing these data to be available to the users at the sametime. One example of these tools is the A-vast antivirus program .
Network security refers to any activity designed to protect the usability, integrity, reliability, and safety ofdata during their transmission on a network, Network security deals with hardware and software, Theactivity can be one of the following anti-virus and anti- spyware, firewall, Intrusion prevention systems, andVirtual Private Networks .
Internet Security is measures and procedures used to protect data during their transmission over acollection of interconnected networks .while information security is about how to prevent attacks, and todetect attacks on information-based systems.Cryptanalysis (code breaking) is the study of principles and methods of deciphering cipher text withoutknowing the key, typically this includes finding and guessing the secrete key, It's a complex processinvolving statistical analysis, analytical reasoning, math tools and pattern-finding, The field of bothcryptography and cryptanalysis is called cryptology .
Symmetric encryption refers to the
process of converting plaintext into cipher text at the sender with thesame key that will be used to retrieve plaintext from cipher text at the recipient. while asymmetricencryption refers to the process of converting plaintext into cipher text at the sender with different keythat will be used to retrieve plaintext from cipher text at the recipient .
Passive attacks mean that the attackers or the unauthorized parties just monitoring on the traffic or onthe communication between the sender and the recipient, but not attempting to breach or shut down aservice, This kind of attacks is very hard to discover, since the unauthorized party doesnt leave anytraces. On the other hand active attacks mean that the attackers are actively attempting to cause harmto the network or the data. The attackers are not just monitoring on the traffic, but they also attempt tobreach or shut down the service .
Authentication is the process of determining whether someone is the same person who really is, such aslogin and password in login pages while authorization is the process of ensuring that this person has theability to do something. Brute force is the attacker who is trying all of the possible keys that may be used in either decrypt or encrypt information.
TYPES OF CRYPTOGRAPHY
There are many types of cryptography, including codes, steganography (hidden orsecret writing), and ciphers. Codes rely on codebooks. Steganography relies on different ways tohide or disguise writing. Ciphers include both computer- generated ciphers and those created byencryption methods. The different types of ciphers depend on alphabetical, numerical, computerbased,or other scrambling methods.
Codes and Codebooks
A well-constructed code can represent phrases and entire sentences with symbols,such as five-letter groups, and is often used more for economy than for secrecy. A properlyconstructed code can give a high degree of security, but the difficulty of printing and distributingcodebooksbooks of known codesunder conditions of absolute secrecy limits their use toplaces in which the books can be effectively guarded. In addition, the more a codebook is used,the less secure it becomes.
Imagine a codebook with two columns. In the first column is a list of all the wordsthat a military commander could possibly need to use to communicate. For example, it containsall the possible geographic areas in a region, all possible times, and all military terms. In theother column is a list of plain words. To create a coded message, the encoder writes down theactual message. He then substitutes words in the codebook by finding matches in the secondcolumn for the words in the message and using the new words instead. For example, suppose themessage is Attack the hill at dawn and the codebook contains the following word pairs: attack =bear, the = juice, hill = orange, at = calendar, and dawn = open. The encoded message wouldread Bear juice orange calendar open.
If the coded message fell into enemy hands, the enemy would know it was in code,but without the codebook the enemy would have no way to decrypt the message. Codebooks losesome of their value over time, however. For example, if the coded message fell into enemy
handsand the next day the hill was attacked at dawn, the enemy could link the event to the codedmessage. If another message containing the word orange were captured, and the following day,something else happened on the hill, the enemy could assume that orange = hill is in thecodebook. Over time, the enemy could put together more and more code word pairs, andeventually crack the code. For this reason, it is common to change codes often.
Steganography is a method of hiding the existence of a message using tools such asinvisible ink, microscopic writing, or hiding code words within sentences of a message (such asmaking every fifth word in a text part of the message). Cryptographers may apply steganographyto electronic communications. This application is called transmission security.Steganography, or secret writing, seems to have originated almost as early aswriting itself did. Even in ancient Egypt, where writing itself was a mystery to the averageperson, two distinct forms of writing were used. Hieratic or sacred writing was used for secretcommunication by the priests, and demotic writing was used by other literate people. The ancientGreeks and Romans, as well as other civilizations that flourished at around the same time, usedforms of steganography. The invention of the first shorthand system was presumably intended asa form of secret writing. Shorthand first came into wide use in ancient Rome, with notaeTironianae ('Tironian notes'), a system invented by Marcus TulliusTiro in 63 BC.
Ease of use makes ciphers popular. There are two general types of ciphers.
Substitution ciphers require a cipher alphabet to replace plaintext with other letters or symbols.Transposition ciphers use the shuffling of letters in a word to make the word incomprehensible.Ciphers are the secret codes used to encrypt plaintext messages. Ciphers of varioustypes have been devised, but all of them are either substitution or transposition ciphers.Computer ciphers are ciphers that are used for digital messages. Computer ciphers differ fromordinary substitution and transposition ciphers in that a computer application performs theencryption of data. The term cryptography is sometimes restricted to the use of ciphers or tomethods involving the
substitution of other letters or symbols for the original letters of amessage.
Computer Ciphers & Encryption
Government agencies, banks, and many corporations now routinely send a great dealof confidential information from one computer to another. Such data are usually transmitted viatelephone lines or oter nonprivate channels, such as the Internet. Continuing development ofsecure computer systems and networks will ensure that confidential information can be securelytransferred across computer networks.
Cryptanalysis is the art of analyzing ciphertext to extract the plaintext or the key. Inother words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.Understanding the process of code breaking is very important when designing any encryptionsystem. The science of cryptography has kept up with the technological explosion of the last halfof the 20th century. Current systems require very powerful computer systems to encrypt anddecrypt data. While cryptanalysis has improved as well, some systems may exist that areunbreakable by todays standards.
Todays cryptanalysis is measured by
the number and speed of computers availableto the code breaker. Some cryptographers believe that the National Security Agency (NSA) ofthe United States has enormous, extremely powerful computers that are entirely devoted tocryptanalysis.The substitution ciphers described above are easy to break. Before computers wereavailable, expert cryptanalysts would look at ciphertext and make guesses as to which letterswere substituted for which other letters. Early cryptanalysis techniques included computing thefrequency with which letters occur in the language that is being intercepted. For example, in theEnglish language, the letters e, s, t, a, m, and n occur much more frequently than do q, z, x, y, andw. So, cryptanalysts look at the ciphertext for the most frequently occurring letters and assignthem as candidates to be e, s, t, a, m, and n. Cryptanalysts also know that certain combinations ofletters are more common in the English language than others are. For example, q and u occurtogether, and so do t and h. The more ciphertext that is available, the better the chances ofbreaking the code.
Confidentiality: Protection from disclosure to unauthorised persons,Integrity:Maintaining data consistency,Authentication: Assurance of identity of person or originator ofdata.Non- repudiation: Originator of communications cant deny it later,Availability: Legitimateusers have access when they need it,Access control: Unauthorised users are kept out.These are often combined: User authentication used for access control purposes, Non-repudiationcombined with authentication.
Information disclosure/information leakage,Integrity violation,Masquerading,Denialof service Illegitimate use,Generic threat: Backdoors, trojan horses, insider attacks,Most Internetsecurity problems are access control or authentication ones: Denial of service is also popular, butmostly an annoyance.
SYMMETRIC AND ASYMMETRIC ENCRYPTION
Encryption is the strongest and the safest way in securing data. Certainly, it is the most common one.Encryption systems are divided into two major types or forms, symmetric and asymmetric.
Symmetric encryption is known as secret key or single key, The receiver uses the same key which thesender uses to encrypt the data to decrypt the message,. This system was the only system used beforediscovering and developing the public key. A safe way of data transfer must be used to moving thesecret key between the sender and the receiver in symmetric encryption. Figure 4 shows how the systemworks. Symmetric encryption occurs either by substitution transposition technique, or by a mixture ofboth. Substitution maps each plaintext element into cipher text element, but transposition transposes thepositions of plaintext elements.
Asymmetric encryption is slower and very complicated in calculations than symmetric encryption .Therefore, asymmetric encryption deals with plaintext as a group of numbers which are manipulated inmathematics, while the plaintext in symmetric encryption deal as group of symbols and characters, theencryption process may permute these symbols, or may substitute one symbol by another.So the nature of the data determines the system of encryption type. And every system has its own uses.For example, asymmetric encryption may be used in authentication or in sending secret key fordecryption.
Model for Network Security
using this model requires us to:
design a suitable algorithm for the security transformation
generate the secret information (keys) used by the algorithm
develop methods to distribute and share the secret information
specify a protocol enabling the principals to use the transformation and secret information for a security service
Model for Network Access Security
CRYPTOGRAPHY TECHNIQUES OF SECURED MANETS/WSNS DESIGN Security is the combination of processes, procedures and systems used to ensure confidentiality,authentication, integrity, availability, access control, and non-repudiation.
Confidentiality: The goal of confidentiality is to keep sent information from being read byunauthorized users or nodes. MANETs/WSNs use an open medium, so usually all nodes withinthe direct transmission range can obtain the data. One way to keep information confidential is toencrypt the data. In WSNs, confidentiality is achieved to protect information from disclosurewhen communication is between one sensor node and another sensor node or between the sensorsand the base station. Compromised nodes may be a threat to confidentiality if the cryptographickeys are not encrypted and stored in the node.
Authentication: The goal of authentication is to be able to identify a node or a user and toprevent impersonation. In wired networks and infrastructure-based wireless networks,
it ispossible to implement a central authority at a router, base station, or access point. However, thereis no central authority in MANETs/WSNs, and it is much more difficult to authenticate an entity.Confidentiality can be achieved via encryption. Authentication can be achieved by using amessage authentication code (MAC) (Menezes, Oorschot& Vanstone, 1996).
Integrity: The goal of integrity is to keep a sent message from being illegally altered or destroyedduring transmission. When the data is sent through the wireless medium, the data can be modifiedor deleted by malicious attackers. The malicious attackers can also resend it, an action known as areplay attack. Integrity can be achieved through hash functions.
Non-repudiation: The goal of non- repudiation is related to the fact that if an entity sends amessage, the entity cannot deny that it sent the message. By producing a signature for themessage, the entity cannot later deny having sent that message. In public key cryptography, anode, A, signs the message using its private key. All other nodes can verify the signed messageby using A's public key, and A cannot deny that its signature is attached to the message.
Availability: The goal of availability is to keep the network service or resources available tolegitimate users. It ensures the survivability of the network despite malicious incidents. In a WSN,the examples of risk of loss of availability can be sensor node capturing and denial of serviceattacks. One solution could be to provide alternative routes in the protocols employed by theWSN to mitigate the effect of outages.
Access control: The goal of access
control is to prevent unauthorized use of network services andsystem resources. Obviously, access control is tied to authentication attributes. In general, accesscontrol is the most commonly needed service in both network communications and
Cryptography is very strongly tied to mathematics and number theory. It is, therefore, difficult tocreate a new design using composite cryptographic techniques without the sound security analysis behindit, usuallybased on cryptographic reasoning. One way to reach this goal is to learn from others byreviewing the current MANET/WSN security schemes, and also to understand the network to furtherunderstand how cryptographic techniques combine with MANETs/WSNs to provide a security servicewith reasonable network performance, scalability, storage, and synchronization. Certainly the securitydesign can be evaluated using different techniques. Our goal is to provide perspective using cryptographictechniques and study basic cryptographic techniques (as seen in Figure 1) when applied to authentication,trust, and key management in MANETs/WSNs. Furthermore, we can study several of the mostcommonly-used cryptographic techniques and see how they are employed to deal with different tasks andbalance security and performance.
It is a common approach today to use software engineering design patterns to illustrate the design ofobject-oriented programming. Likewise, in security and performance of MANETs/WSNs, cryptographictechniques can successfully be used in different stages of network bootstrap, packet communication, andfactors to be evaluated. These techniques can certainly be reused after the analysis as known techniquesfrom the cryptography perspective. One of the approaches we take here is to break down the design usingcryptographic techniques and do some reverse engineering, then see how the new design is formed usingdifferent cryptographic techniques.
Cryptography is used to ensure that the contents of a message are confidentiality transmitted and wouldnot be altered. Confidentiality means nobody can understand the received message except the one thathas the decipher key, and "data cannot be changed" means the original information would not bechanged or modified; this is done when the sender includes a cryptographic operation called
a hashfunction in the original message. A hash function is a mathematical representation of the information,when information arrives at its receiver; the receiver calculates the value of this hash function. If thereceivers hash function value is equivalent to the senders, the integrity of the message is assured. Inthis survey paper we describe and compare between symmetric and asymmetric encryption technique. Cryptology presents a difficulty not found in normal academic disciplines: the needfor the proper interaction of cryptography and cryptanalysis. This arises out of the fact that in theabsence of real communications requirements, it is easy to propose a system that appearsunbreakable. Many academic designs are so complex that the would be cryptanalyst doesntknow where to start; exposing flaws in these designs is far harder than designing them in the firstplace. The result is that the competitive process, which is one strong motivation in academicresearch, cannot take hold.
Many applications are useful in real- time and daily life that areimplementd bycryptography through implicit or explicit concept of it.For example banking system,ATMcards, Smart cards, Magnetic strip technology,National Security Agency(NSA) to traceinformation through RADAR and with well equipped material,E-commerce,E- economics,business information,operating systems,databases and finally in System Protection.In this way Cryptography has many roles and many applicationprovide many example to show the differences.
M. Bellare, V. T. Hoang and P. Rogaway.
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. Advances in Cryptology – Asiacrypt 2012 Proceedings, Lecture Notes in Computer Science Vol. 7658, X. Wang and K. Sakoeds, Springer-Verlag, 2012.
M. Bellare, K. Paterson and S. Thomson.
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
Advances in Cryptology – Asiacrypt2012 Proceedings, Lecture
Notes in Computer Science Vol. 7658,
X. Wang and K. Sakoeds, Springer- Verlag, 2012.
Canetti, R., Krawczyk, H.: Universally composable notions of key exchange andsecure channels. In: Knudsen, L. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp.337351. Springer, Heidelberg (2002)
Cortier, V., Delaune, S.: Safely composing security protocols. Formal Methods inSystem Design 34(1), 136 (2009)
Die, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions onInformation Theory 22, 644654 (1976)
Goldwasser, S., Micali, S., Racko, C.: The knowledge complexity of interactiveproof systems. SIAM J. Comput. 18(1), 186208 (1989)
Gross, T., MÂ¨odersheim, S.: Vertical protocol composition. In: 24th IEEE ComputerSecurity Foundations Workshop (CSF 2011)
Guttman, J.D., Thayer, F.J.: Protocol Independence through Disjoint Encryption.In: Computer Security Foundations Workshop, pp. 2434 (2000)
Maurer, U.: Secret key agreement by public discussion from common information.IEEE Transactions on Information Theory 39(3), 733742 (1993)
Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.)EUROCRYPT 2002. LNCS, vol. 2332, pp. 110132. Springer, Heidelberg (2002)
Maurer, U.: Abstraction in cryptography. In: Halevi, S. (ed.) CRYPTO 2009.LNCS, vol. 5677, p.
465. Springer, Heidelberg (2009)
Publication 197 – Announcing the Advanced Encryption Standard (AES). FederalInformation Processing Standards, 26 Nov. 2001.
Ralston, Anthony, Edwin D. Reilly, and David Hemmendinger. Encyclopedia ofComputer Science. Fourth ed. London, England: Nature Publishing Group, 2000
Rosen, Kenneth H. Elementary Number Theory and Its Applications. Boston:Pearson/Addison Wesley, 2005.
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: Wiley, 1996.
Trappe, Wade, and Lawrence C. Washington. Introduction to Cryptography: withCoding Theory. Upper Saddle River, NJ: Prentice Hall, 2002.
Stinson, Douglas R. Cryptography: Theory and Practice. Boca Raton: Chapman & Hall/CRC, 2002.
Wolfram, Stephen. A New Kind of Science. Champaign, IL: Wolfram Media, 2002.
Michel Abdalla, Emmanuel Bresson, Olivier Chevassut and David Pointcheval,
Password-based Group Key Exchange in a Constant Number of Rounds, Public Key Cryptography – PKC 2006, Moti Yung, YevgeniyDodis, AggelosKiayias, and Tal Malkin (Eds.), LNCS 3958, pp. 427-442, Springer-
Verlag, April 2006.
Michel Abdalla, MalikaIzabachÃ¨ne, and David Pointcheval,
Anonymous and Transparent Gateway- based Password-Authenticated Key Exchange,
7th International Conference on Cryptology and Network Security – CANS 2008, LNCS 5339, pp. 133–148,
Â© Springer, Matthew Franklin, Lucas Hui, and Duncan Wong (Eds.), December 2008.
Novak, R.: SPABased Adaptive Chose nCiphertext Attack on RSA Implement ation. In Naccache, D., ed: Public Key Crytography 2002. Volume 2274 of LN CS., Springer, 2002, pages 252262.
Leave a Reply
You must be logged in to post a comment.