EFFICIENT ENCRYPTION TECHNIQUES FOR NETWORK SECURITY.

Added on - 21 Sep 2019

  • Dissertation

    type

  • 8

    pages

  • 3512

    words

  • 102

    views

  • 0

    downloads

Showing pages 1 to 3 of 8 pages
EFFICIENT ENCRYPTION TECHNIQUES FOR NETWORK SECURITYAbstractProviding security is an essential part ofevery application and providing security onthe network is to protect data transmissionon the wireless channel. Data transmissionon the untrustworthy network needs a secureprocess that ensures secure transmission ona network channel. This contains the processof authentication and authorization thatprovides a secure data access and all thisworks where carried by an administrator.Authentication has an ID and password thatallows them to access information accordingto their authenticity. Authorization helps tovalidate the user authenticity and provideaccess to their authority. Every job have tobe protected and providing security onnetwork channels covers most of the workson computer networks. Very transaction andcommunication on network channel have tobe secure in a private and public sense.Applications like industry, corporateorganizations, government’s agencies, andpersonal data transmissions need security toprotect their sensitive data’s. Networks canbe private and public according to theapplications, some industry;the organizationhas a private network channel that providesauthority to access by their peoples. Publicnetworks like social websites, socialnetworks have an access to personalindividuals can access, so by providingsecurity to individual data is more required.Cryptographic techniques are used to protectthe data’s that are both private and public.Keywords: Cryptography, encryption,security, network security, computernetworks, wireless network channels.1.IntroductionNetwork security is essential in informationsecurity as it has the responsibilities tosecure all data’s that are in networkchannel.A security involves a layer ofprotection like monitoring networkchannels, Anti-virus software, Securitysoftware, and firewalls. Monitoring andsecurity software’s works together toproviding security on network channels [1].Network security consists of therequirements and procedures that a networkadministrator should adopt to protect theuser data from unauthorized access frommisusing, alteration, eliminating theunauthorized access to network resources.Everyday job that in today’s world onnetwork conducting data transaction andtransmission on business organization,government and individual people data [1].The process of converting plain text into aciphertext is called cryptography. Someprotocols using cryptography is used toblock rivals.Cryptography contains acomplex mathematics with computer sciencethat helps to provide data security. Datasecurity relays data integrity, confidentiality,authenticationandauthorization.Cryptography and cryptanalysis is acombination of cryptology. Converting plaintext into cypher text is called cryptographywhere else decrypting the cypher back toplain text is called cryptanalysis. Encryptionis a process that converts a normal text intoa non-understandable text called cipher test.Decryption is the process that converts theciphertext back to the original plaintext [1].This report has a survey and reviews onsecurity service on network channels withcryptographic methods.
2.Possible types of AttacksPassive and active attacks are the types ofattacks present in the network channels [2][7].2.1 Active AttacksThese types of attacks are harmful, as it willchange the information in the data flow thatcould affect the resource.Alteration of massage: A delay whilereceiving message show that the messagesare altered. Fully or some portion ofmessage are changed.Denial of service: Destroy message that is atreceiving end.Replay content: It is that the attacker reads adata and retransfer the data to a receiver or itcan retransmit to an unauthorized user.Masquerade: They pretends to be notinvolved or involved to some other entity.2.2 Passive AttacksThese type of attacks does not have anyharmful to the system resource, as it will justto learn the message. This will not affect thesystem resource. The main aim of theattacker is to obtain the data that are beingtransmitted.Traffic analysis: A traffic message is sent sothat both sender and receiver do not have aknowledge that their message is read bysomeone.Reveal the message: the attacker readssender message or third party memberbefore it reaches to the target person.3.Security serviceOpen system communication has a layer ofprotocol that ensures a system securityduring data transfer. Improves securityduring data processing and data transmission[9].3.1 Data IntegrityThis refers to the data accuracy and ensurethat that data in network channel does notmodify attackers. If both the sender andreceiver receives the same message then itensures the data integrity.3.2 Data ConfidentialityAllowing only an authorized person toaccess the data, this means protectingprivacy to the user personal data. A lack ofdata confidentiality will reveal userinformation.3.3 AuthenticationProviding authenticity to all channels nodeson the network to ensure the security byallowing authorized persons to access.3.4 Non-repudiationBoth sender and receiver shouldacknowledge, the sender should receive anacknowledgment that the message is sent tothe receiver and when a receiver receives amessage then sender should know that thereceiver received a message.3.5 Access controlThis is to control the access to the systemand application with links. To achieveaccess control each entry has to gain accessso that they can access the information sothat unauthorized access can be avoided.4.Cryptography principles forsecurity4.1 ReplicationCiphertext contains a redundancy of data sothat attackers do not understand what themessage is. It is necessary to have aredundancy in the message so that it willbecome difficult to find out the encryptedmessage [4].
4.2 Cleanness and timely-arrivalEvery message should have a timestamp sothat whenever receiver receives the lastmessage then by timestamp says that thereceived message can be stolen or changedby someone [9].5.Type of cryptosystemSymmetric and Asymmetric are the type ofcryptosystem to encrypt the message. If bothsender and receiver have the the same key toencrypt and decrypt then this is called assymmetric where else if both sender and thereceiver have different key to do encryptionand decryption then it is called Asymmetric[9].Security is more important on the computeras well as communication channels asproviding privacy and authenticity to data.To provide security cryptosystem are used,the Encryption algorithm used to convert theplain text to cypher text, this ciphertext ispassed to the network channel and when areceiver receives ciphertext then they willuse a decryption algorithm to convert thecipher text into the plain text a human-readable form.5.1.1Asymmetric cryptosystemThis cryptosystem has a different key onefor encrypting and another one fordecrypting. A user A can communicate withuser B by encrypting the plaintext using B’spublic keys and User B has an authenticityto decrypt the ciphertext using his privatekey. This can also be called as public keyencryption or Asymmetric algorithm[9].5.1.2 Symmetric cryptosystemIn this symmetric cryptosystem, both senderand receiver have a key that is identical thatare used for encryption and decryption. Forsecure data transmission, this keys are keptsecret and are exchanged between theuser[9].5.1.3 Hash FunctionIn hash function, a message digest is usedfor encryption and it is a one-wayencrypting algorithm. The hash functionaccepts a message of any size as its inputmessage and gives the output a fixed lengthvalue. The main goal of a hash function onsecurity is to provide a data integrity. Smallchanges in the message give a highprobability in discovering hash function [6].5.2Basic terms of cryptographyCryptographic algorithm: Algorithm thatused to change plain text into cipher text andcipher text into plain text.Cryptanalysis: This allows finding thebreaking ciphers.Cryptology: The combination ofcryptography and cryptanalysis is calledcryptology.6.Cryptographic modelA user A wants to send a message to user B,to send a secure message on communicationfrom being hacks. User A will encrypt themessage using encryption algorithm with apublic key or an identical key and send theciphertext to the receiver usingcommunication channels.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document