logo

Cryptography Techniques and Challenges: An Overview

   

Added on  2022-10-31

5 Pages1751 Words65 Views
INFORMATION SECURITY 0
Cryptography
Cryptography Techniques and Challenges: An Overview_1
INFORMATION SECURITY 1
Abstract-Cryptography is the two way technological
processes to convert the original plain text to cipher
text. It stores and transfer data in a form that only the
particular authorized person is intended to read and
process so that data security and authentication can
be maintained. It uses the encryption and decryption
methods for improving the performance of the
communication systems. This paper mainly focuses
on the cryptography techniques and challenges linked
with the cryptography. It is identified that security is
a major problem linked with cryptography that may
affect the subtle data of the clients. So, it is
recommended that the consumers should focus on the
configuration process while using cryptography and
evade the use of third party networks and servers.
Introduction
Cryptography is a kind of technique for securing
communication networks and systems in the presence
of third parties. It is observed that the rate of cyber-
attacks and threats is growing quickly for companies
that require a technique for securing sensitive data
and communication networks [1]. Cryptography is an
effective technique that can be used by companies for
improving the privacy of data communication
channels. The key significance of this research is to
examine the concept behind cryptography and
evaluate the challenges or issues linked with the
cryptography technique. This research will involve
technologies involve in the cryptography, security
issues and gaps in the literature.
Overview of the technology
The term cryptography refers to a technique which is
used for protecting data and communication networks
from hackers and third parties. In which the
consumers can provide a particular code to the
information that cannot be hacked by the attackers
without using the private key. A recent study
examined that cryptography technique has the
potential to reduce the rate of security attacks and
increase the security of sensitive data [2]. Mainly, it
converts data into a form of code which is unreadable
for the criminals and transmitted from one source to
another using communication channels and the
receiver requires a private key for accessing the
transmitted signals. Information security utilizes
cryptography on various levels and the data cannot be
read without using a key to access the transmitted
data from the source [3].
The information maintains its integrity at the time of
transmission and cryptography is capable to control
and handle the rate of cyber-attacks by blocking the
unauthorized networks from the systems. A recent
study stated that cryptography uses the private keys
that help the consumers for refining the
confidentiality of subtle information. More than 67%
of the businesses are spending the concept of
cryptography and encryption in order to reduce the
unauthorized access presence in the systems and
manage the data breach-related problems.
Cryptography is also defined as cryptology that
includes nonrepudiation by which the consumers can
perform data transmission effectively [4].
The major function of nonrepudiation is that it is able
to verify and secure the data transmitted through one
source to another. Therefore, it is suggested that the
companies can adopt the cryptography technique in
the security systems as it is capable to uphold the
confidentiality of statistics effectively and reduce the
unauthentic access occurred in the computing
networks [1].
Relevant technologies and applications
There are various kinds of technologies include in the
cryptography which are described below along with
their applications:
Symmetric key cryptography
It is one of the effective techniques used in
cryptography that uses a single key in order to protect
data against unauthorized access and networks. It is
observed that in asymmetric key techniques the data
will be encoded by the consumers using a key and
transferred to the consumers in an appropriate
manner [5]. The receiver mainly receives the
ciphertext which is encrypted into a form of code and
Cryptography
Cryptography Techniques and Challenges: An Overview_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Uses Of Cryptography Techniques
|8
|3872
|245

Efficient Encryption Techniques for Network Security
|8
|3512
|331

Mathematics for IT. - Assignment
|11
|2501
|13

Information Security Cryptography Techniques
|8
|3543
|84

Cryptography and System Security .
|7
|1528
|232

Cyber security Attacks | Assessment 1
|7
|1374
|30