Cryptography in Network Security: Literature Search and Critique
VerifiedAdded on 2020/04/13
|18
|4413
|152
Report
AI Summary
This report delves into the critical role of cryptography in network security, offering a comprehensive literature search and a detailed critique of a significant research paper, "Analysis of Cryptographic Algorithms for Network Security." The report begins with an overview of the importance of cryptography in the modern digital landscape, where data security is paramount. It then presents six research papers, summarizing their key findings on topics like cryptographic algorithms, network security, and encryption techniques. The core of the report is a critique of the chosen paper, evaluating its significance, contribution to knowledge, practical applications, presentation, and areas for improvement. The analysis highlights the importance of cryptography in securing data transmission, ensuring confidentiality, and providing solutions for various security challenges. The report emphasizes the need for robust encryption techniques and the evolving landscape of cryptographic algorithms to combat emerging threats.

Running head: LITERATURE SEARCH AND PAPER CRITIQUE
Literature Search and Significant Paper Critique
Role of Cryptography in Network Security Principles and Practice
Student Name:
University Name:
Literature Search and Significant Paper Critique
Role of Cryptography in Network Security Principles and Practice
Student Name:
University Name:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1LITERATURE SEARCH AND PAPER CRITIQUE
Table of Contents
1. Overview of the interested area...................................................................................................2
2. Importance of chosen research papers.........................................................................................2
2.1 Brief overview of work presented in each paper...................................................................2
3. Significant Paper Critique............................................................................................................5
3.1 Introduction............................................................................................................................5
3.2 Significance of the research...................................................................................................6
3.3 Contribution to knowledge....................................................................................................7
3.4 Practical application of the work...........................................................................................9
3.5 Presentation of the paper.....................................................................................................11
3.6 Recommendations for improvement....................................................................................12
3.7 Conclusion...........................................................................................................................12
References......................................................................................................................................14
Appendix: Copy of selected single significant paper....................................................................17
Table of Contents
1. Overview of the interested area...................................................................................................2
2. Importance of chosen research papers.........................................................................................2
2.1 Brief overview of work presented in each paper...................................................................2
3. Significant Paper Critique............................................................................................................5
3.1 Introduction............................................................................................................................5
3.2 Significance of the research...................................................................................................6
3.3 Contribution to knowledge....................................................................................................7
3.4 Practical application of the work...........................................................................................9
3.5 Presentation of the paper.....................................................................................................11
3.6 Recommendations for improvement....................................................................................12
3.7 Conclusion...........................................................................................................................12
References......................................................................................................................................14
Appendix: Copy of selected single significant paper....................................................................17

2LITERATURE SEARCH AND PAPER CRITIQUE
1. Overview of the interested area
The area that has been chosen for literature search and review is Cryptography. It has
been chosen as the area of research as in this modern world of electronic communication, the
security of data is a major concern. Hence, Cryptography plays an important role in ensuring that
data is protected and unauthorized access is restricted. This area is rising to be the emerging
trend in network security as it will allow the people to be confident upon the electronic world.
The interest in this area of research is growing rapidly as Cryptography is related to security of
networks and data.
2. Importance of chosen research papers
The six papers that have been chosen for this literature research are being presented in the
below section along with details of the work reflected in each paper. The papers been chosen for
this study are of utmost importance as those illustrates on the concept of cryptography and the
role being played by it for the security of data as well as networks. The discussions based on
various cryptographic techniques have also been reflected in the research papers to demonstrate
the suitable techniques that can be or are being used in real world applications. Hence, the six
papers that have been chosen are critical for this literature research on cryptography.
2.1 Brief overview of work presented in each paper
Paper 1 – Kumar, S.N., 2015. Review on Network Security and Cryptography.
International Transaction of Electrical and Computer Engineers System, 3(1), pp.1-11.
In this paper, the author has made an attempt to review the concept of cryptography and
network security. There is large amount of data being produced daily in organizations with the
increasing usage of Internet, e-commerce applications as well as social networks. The most
1. Overview of the interested area
The area that has been chosen for literature search and review is Cryptography. It has
been chosen as the area of research as in this modern world of electronic communication, the
security of data is a major concern. Hence, Cryptography plays an important role in ensuring that
data is protected and unauthorized access is restricted. This area is rising to be the emerging
trend in network security as it will allow the people to be confident upon the electronic world.
The interest in this area of research is growing rapidly as Cryptography is related to security of
networks and data.
2. Importance of chosen research papers
The six papers that have been chosen for this literature research are being presented in the
below section along with details of the work reflected in each paper. The papers been chosen for
this study are of utmost importance as those illustrates on the concept of cryptography and the
role being played by it for the security of data as well as networks. The discussions based on
various cryptographic techniques have also been reflected in the research papers to demonstrate
the suitable techniques that can be or are being used in real world applications. Hence, the six
papers that have been chosen are critical for this literature research on cryptography.
2.1 Brief overview of work presented in each paper
Paper 1 – Kumar, S.N., 2015. Review on Network Security and Cryptography.
International Transaction of Electrical and Computer Engineers System, 3(1), pp.1-11.
In this paper, the author has made an attempt to review the concept of cryptography and
network security. There is large amount of data being produced daily in organizations with the
increasing usage of Internet, e-commerce applications as well as social networks. The most
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3LITERATURE SEARCH AND PAPER CRITIQUE
critical issue that is rising in context to data is security to ensure that information is transmitted
safely. The issues of network security is also arising as one of the important aspect in this age of
digital information. Hence, in this paper Kumar (2015), has discussed about the various
cryptographic algorithms being used in network applications.
Paper 2 – Joshi, M.R. and Karkade, R.A., 2015. Network security with
cryptography. “International Journal of Computer Science and Mobile Computing”
IJCSMCVol, 4, pp.201-204.
In this paper, the authors Joshi and Karkade (2015), have presented network security and
cryptography as the concept of protecting the network along with transmission of data being
carried out over wireless networks. In an unreliable network, the major concern while data
transmission is security of the data or information. The security of a network comprises of
authorization so that data can be accessed in a network which is under the control of network
administrator. The work that has been presented in this paper comprises of the importance of
cryptography, principles of cryptography and the various types of cryptographic systems.
Paper 3 – Babita, E. and Kaur, E.G., 2017. A Review: Network Security Based On
Cryptography & Steganography Techniques. International Journal, 8(4).
In this modern age of technology, digital communication is emerging as important
medium for ensuring security of information being transmitted in between the sender and
receiver. Hence, security is an essential aspect while exchanging of information to ensure that the
information is secure from intruders or attackers. In this paper, the authors Babita and Kaur
(2017), have illustrated on the hierarchy of techniques being used for network security. Further,
the authors have discussed on Cryptography and Steganography as security mechanisms being
critical issue that is rising in context to data is security to ensure that information is transmitted
safely. The issues of network security is also arising as one of the important aspect in this age of
digital information. Hence, in this paper Kumar (2015), has discussed about the various
cryptographic algorithms being used in network applications.
Paper 2 – Joshi, M.R. and Karkade, R.A., 2015. Network security with
cryptography. “International Journal of Computer Science and Mobile Computing”
IJCSMCVol, 4, pp.201-204.
In this paper, the authors Joshi and Karkade (2015), have presented network security and
cryptography as the concept of protecting the network along with transmission of data being
carried out over wireless networks. In an unreliable network, the major concern while data
transmission is security of the data or information. The security of a network comprises of
authorization so that data can be accessed in a network which is under the control of network
administrator. The work that has been presented in this paper comprises of the importance of
cryptography, principles of cryptography and the various types of cryptographic systems.
Paper 3 – Babita, E. and Kaur, E.G., 2017. A Review: Network Security Based On
Cryptography & Steganography Techniques. International Journal, 8(4).
In this modern age of technology, digital communication is emerging as important
medium for ensuring security of information being transmitted in between the sender and
receiver. Hence, security is an essential aspect while exchanging of information to ensure that the
information is secure from intruders or attackers. In this paper, the authors Babita and Kaur
(2017), have illustrated on the hierarchy of techniques being used for network security. Further,
the authors have discussed on Cryptography and Steganography as security mechanisms being
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4LITERATURE SEARCH AND PAPER CRITIQUE
used popularly. Cryptography is used for encryptions and decryption of data for secure
transmission while Steganography is used to hide data within other cover media.
Paper 4 – Acharya, K., Sajwan, M. and Bhargava, S., 2014. Analysis of
Cryptographic Algorithms for Network Security. International Journal of Computer
Applications Technology and Research, 3(2), pp.130-135.
The major role being played by cryptography is securing of data while transmission of
data or information over network. The function of this technique is to ensure that contents of a
message or information are being transmitted confidentially and are not altered. Cryptography is
also an essential aspect in context to challenges associated with IT security as it comprises of
privacy, confidentiality as well as identity which in turn offers platform for trusted e-commerce
along with secure communication. In this paper, the authors Acharya, Sajwan and Bhargava
(2014), have analyzed some well-known algorithms related to cryptography and demonstrated
the differences between existing techniques for encryption.
Paper 5 – Kapoor, V. and Yadav, R., 2016. A Hybrid Cryptography Technique for
Improving Network Security. International Journal of Computer Applications (0975–8887)
Volume.
The primary concern of network providers along with service providers is data and
security of the network. Hence, cryptographic techniques are being used for ensuring security of
data at the time of data transmission for various communication purposes. The traditional
cryptographic techniques are unable to provide the required level of security as the attackers now
a days are aware of the techniques and knows about the solution. Therefore, there is a need for
new type of cryptographic technique so as to improve the security as well as complexity of data
used popularly. Cryptography is used for encryptions and decryption of data for secure
transmission while Steganography is used to hide data within other cover media.
Paper 4 – Acharya, K., Sajwan, M. and Bhargava, S., 2014. Analysis of
Cryptographic Algorithms for Network Security. International Journal of Computer
Applications Technology and Research, 3(2), pp.130-135.
The major role being played by cryptography is securing of data while transmission of
data or information over network. The function of this technique is to ensure that contents of a
message or information are being transmitted confidentially and are not altered. Cryptography is
also an essential aspect in context to challenges associated with IT security as it comprises of
privacy, confidentiality as well as identity which in turn offers platform for trusted e-commerce
along with secure communication. In this paper, the authors Acharya, Sajwan and Bhargava
(2014), have analyzed some well-known algorithms related to cryptography and demonstrated
the differences between existing techniques for encryption.
Paper 5 – Kapoor, V. and Yadav, R., 2016. A Hybrid Cryptography Technique for
Improving Network Security. International Journal of Computer Applications (0975–8887)
Volume.
The primary concern of network providers along with service providers is data and
security of the network. Hence, cryptographic techniques are being used for ensuring security of
data at the time of data transmission for various communication purposes. The traditional
cryptographic techniques are unable to provide the required level of security as the attackers now
a days are aware of the techniques and knows about the solution. Therefore, there is a need for
new type of cryptographic technique so as to improve the security as well as complexity of data

5LITERATURE SEARCH AND PAPER CRITIQUE
cipher. In this paper, Kapoor and Yadav (2016), have presented a hybrid cryptographic technique
to improve security of data while transmitting over network. The cryptographic technique that
has been proposed in this paper, promises to offer highly secure technique for cipher generation
with the help of RSA, DES as well as SHA1 technique.
Paper 6 – Anandakumar, S., 2015. Image Cryptography Using RSA Algorithm in
Network Security. International Journal of Computer Science & Engineering
Technology, 5(9).
In this modern world of digital communication, it is crucial that there is application of
proper encryption and decryption while data is being transmitted from one place to other through
Internet for preventing unauthorized access. In this paper, Anandakumar (2015), have illustrated
on Image Cryptography which is considered as a special type of technique for encryption so that
data can be hidden in an image to encrypt or decrypt original message on the basis of some key
value. In this type of cryptography, RSA algorithm is being used for encrypting image files so
that security is enhanced in the area of communication for transmitting data.
3. Significant Paper Critique
3.1 Introduction
The significant paper that has been chosen from the six research papers for this study is
“Analysis of Cryptographic Algorithms for Network Security”, as this paper significantly
discusses on the role being played by Cryptography and the various algorithms that are used for
network security. The function of Cryptography is to ensure that contents of a message or
information are being transmitted confidentially and are not altered. In this paper, the authors
Acharya, Sajwan and Bhargava (2014), have analyzed some well-known algorithms related to
cipher. In this paper, Kapoor and Yadav (2016), have presented a hybrid cryptographic technique
to improve security of data while transmitting over network. The cryptographic technique that
has been proposed in this paper, promises to offer highly secure technique for cipher generation
with the help of RSA, DES as well as SHA1 technique.
Paper 6 – Anandakumar, S., 2015. Image Cryptography Using RSA Algorithm in
Network Security. International Journal of Computer Science & Engineering
Technology, 5(9).
In this modern world of digital communication, it is crucial that there is application of
proper encryption and decryption while data is being transmitted from one place to other through
Internet for preventing unauthorized access. In this paper, Anandakumar (2015), have illustrated
on Image Cryptography which is considered as a special type of technique for encryption so that
data can be hidden in an image to encrypt or decrypt original message on the basis of some key
value. In this type of cryptography, RSA algorithm is being used for encrypting image files so
that security is enhanced in the area of communication for transmitting data.
3. Significant Paper Critique
3.1 Introduction
The significant paper that has been chosen from the six research papers for this study is
“Analysis of Cryptographic Algorithms for Network Security”, as this paper significantly
discusses on the role being played by Cryptography and the various algorithms that are used for
network security. The function of Cryptography is to ensure that contents of a message or
information are being transmitted confidentially and are not altered. In this paper, the authors
Acharya, Sajwan and Bhargava (2014), have analyzed some well-known algorithms related to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6LITERATURE SEARCH AND PAPER CRITIQUE
cryptography and demonstrated the differences between existing techniques for encryption. The
paper have been chosen to critically evaluate the significance of the work being presented by the
authors along with how it contributes to knowledge in the particular area. Further, discussions
are carried out on the practical application of work being presented along with evaluating
presentation of the paper and providing recommendations for making improvements in the work.
3.2 Significance of the research
This research shows that the major role being played by cryptography is securing of data
while transmission of data or information over network. The authors of this paper have
illustrated that the mechanism based on cryptography are the building blocks for computer
security. Cryptography can be associated wherever in the TCP/IP stack, be that as it may not be
typical at physical layer. Cryptography is in like manner used as a piece of tangled traditions that
help to fulfill unmistakable security organizations, in this way called security traditions. The
standard feature of implementing the program for encryption and decryption is generation of
encryption key.
Presently every day, cryptography has numerous business applications. In the event that
classified data has been secured then cryptography gives abnormal state of isolation for
individuals and gatherings. In any case, the key reason for the cryptography can be utilized not
simply to offer classification, but rather additionally to offer responses for various issues like
learning quality, approval and non-renouncement. Cryptography is the strategies that enable data
to be sent in a shielded from such that the main genuine radio ready to get to that data. The
specialists Acharya, Sajwan and Bhargava (2014), have effectively demonstrated that
Cryptography not simply shields learning from burglary or change, but rather may likewise be
utilized for buyer validation. It is required to utilize powerful techniques for encryption and
cryptography and demonstrated the differences between existing techniques for encryption. The
paper have been chosen to critically evaluate the significance of the work being presented by the
authors along with how it contributes to knowledge in the particular area. Further, discussions
are carried out on the practical application of work being presented along with evaluating
presentation of the paper and providing recommendations for making improvements in the work.
3.2 Significance of the research
This research shows that the major role being played by cryptography is securing of data
while transmission of data or information over network. The authors of this paper have
illustrated that the mechanism based on cryptography are the building blocks for computer
security. Cryptography can be associated wherever in the TCP/IP stack, be that as it may not be
typical at physical layer. Cryptography is in like manner used as a piece of tangled traditions that
help to fulfill unmistakable security organizations, in this way called security traditions. The
standard feature of implementing the program for encryption and decryption is generation of
encryption key.
Presently every day, cryptography has numerous business applications. In the event that
classified data has been secured then cryptography gives abnormal state of isolation for
individuals and gatherings. In any case, the key reason for the cryptography can be utilized not
simply to offer classification, but rather additionally to offer responses for various issues like
learning quality, approval and non-renouncement. Cryptography is the strategies that enable data
to be sent in a shielded from such that the main genuine radio ready to get to that data. The
specialists Acharya, Sajwan and Bhargava (2014), have effectively demonstrated that
Cryptography not simply shields learning from burglary or change, but rather may likewise be
utilized for buyer validation. It is required to utilize powerful techniques for encryption and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7LITERATURE SEARCH AND PAPER CRITIQUE
unscrambling to help learning security. Cryptography gives a few wellbeing destinations to
guarantee the isolation of learning, non-modification of information and so forth. System
security includes the approval of utilization of information in a framework, which can be
overseen by the framework overseer. The underlying secured learning is known as plain content.
It is secured in to figure content, that will therefore be unscrambled in to workable plain content.
Cryptographic estimations are arranged on the establishment of the measure of essential which
can be utilized for encryption and decoding.
3.3 Contribution to knowledge
The paper has contributed significantly towards gaining the knowledge and Cryptography
and its importance in network security. The authors of the paper have clearly mentioned the
various roles being played by cryptography along with different existing cryptographic
algorithms. The authors have stated that encryption is not just a gadget for spies and developers,
it can be a noteworthy asset in the business world. The authors have also presented a suitable
example that whenever valuable information related to business processes or transactions is
transmitted through mail or other medium with the help of Internet, then there is a need to use
encryption. They also illustrated that there are various other critical applications for encryption
that are more unremarkable than trade insider certainties, as budgetary data, helpful or true blue
information and so on. From this research paper, knowledge has also been gained that the simple
component of encryption is utilizing a scientific capacity to the plaintext and changing it to an
ensured figure. The harder part is to ensure that the people who are probably going to decipher
that idea may accomplish this easily, however simply those approved can translate it. The
authenticity of the scientific capacity persuading utilized should be built up to ensure that it is
adequately muddled and scientifically solid to give a high measure of security. The journalists
unscrambling to help learning security. Cryptography gives a few wellbeing destinations to
guarantee the isolation of learning, non-modification of information and so forth. System
security includes the approval of utilization of information in a framework, which can be
overseen by the framework overseer. The underlying secured learning is known as plain content.
It is secured in to figure content, that will therefore be unscrambled in to workable plain content.
Cryptographic estimations are arranged on the establishment of the measure of essential which
can be utilized for encryption and decoding.
3.3 Contribution to knowledge
The paper has contributed significantly towards gaining the knowledge and Cryptography
and its importance in network security. The authors of the paper have clearly mentioned the
various roles being played by cryptography along with different existing cryptographic
algorithms. The authors have stated that encryption is not just a gadget for spies and developers,
it can be a noteworthy asset in the business world. The authors have also presented a suitable
example that whenever valuable information related to business processes or transactions is
transmitted through mail or other medium with the help of Internet, then there is a need to use
encryption. They also illustrated that there are various other critical applications for encryption
that are more unremarkable than trade insider certainties, as budgetary data, helpful or true blue
information and so on. From this research paper, knowledge has also been gained that the simple
component of encryption is utilizing a scientific capacity to the plaintext and changing it to an
ensured figure. The harder part is to ensure that the people who are probably going to decipher
that idea may accomplish this easily, however simply those approved can translate it. The
authenticity of the scientific capacity persuading utilized should be built up to ensure that it is
adequately muddled and scientifically solid to give a high measure of security. The journalists

8LITERATURE SEARCH AND PAPER CRITIQUE
clarified that cryptographic equations are classified on the premise of the amount of keys which
are utilized for encryption as well as decryption.
From the review on this paper, it has been determined that before implementation of an
encryption algorithm, there is a need to comprehend the hypothesis behind the security i.e. to
secured data displayed inside a data or document and to guarantee that the data is incoherent to
others. The fundamental sort of the security frame could be the symmetric basic encryption.
More, the specialists have demonstrated that in the symmetric basic security both for the security
and decoding technique precisely the same is utilized. In this manner the mystery of the key is
saved and it is kept private. It works with substantial speed. The symmetric basic security
requires place in two approaches both since the block ciphers or supply ciphers. Among the key
advantages of utilizing the symmetric fundamental security is that the computational energy to
this security strategy is little. The keys for this are unmistakable or there exists a simple change
between the two keys.
The specialists have likewise fixated on unequal fundamental security which truly is
where in reality the keys are distinctive for the strategy for security and the decryption. They are
otherwise called individuals fundamental encryption. Open fundamental techniques are vital
since they can be used for transmitting security keys or other data solidly quite the both the
general population do not have any opportunity to concur with a mystery enter in private.
Improper calculations are for the most part steady and it is unrealistic to use them to scramble a
lot of information. The keys utilized as a part of open key security calculations are for the most
part significantly longer that expands the security of the data being transmitted.
clarified that cryptographic equations are classified on the premise of the amount of keys which
are utilized for encryption as well as decryption.
From the review on this paper, it has been determined that before implementation of an
encryption algorithm, there is a need to comprehend the hypothesis behind the security i.e. to
secured data displayed inside a data or document and to guarantee that the data is incoherent to
others. The fundamental sort of the security frame could be the symmetric basic encryption.
More, the specialists have demonstrated that in the symmetric basic security both for the security
and decoding technique precisely the same is utilized. In this manner the mystery of the key is
saved and it is kept private. It works with substantial speed. The symmetric basic security
requires place in two approaches both since the block ciphers or supply ciphers. Among the key
advantages of utilizing the symmetric fundamental security is that the computational energy to
this security strategy is little. The keys for this are unmistakable or there exists a simple change
between the two keys.
The specialists have likewise fixated on unequal fundamental security which truly is
where in reality the keys are distinctive for the strategy for security and the decryption. They are
otherwise called individuals fundamental encryption. Open fundamental techniques are vital
since they can be used for transmitting security keys or other data solidly quite the both the
general population do not have any opportunity to concur with a mystery enter in private.
Improper calculations are for the most part steady and it is unrealistic to use them to scramble a
lot of information. The keys utilized as a part of open key security calculations are for the most
part significantly longer that expands the security of the data being transmitted.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9LITERATURE SEARCH AND PAPER CRITIQUE
3.4 Practical application of the work
The authors Acharya, Sajwan and Bhargava (2014), has discussed about Quantum
cryptography in one of the sections of this paper, which is an innovation by which two
gatherings can secured framework correspondences by applying the wonders of quantum
material science. Thus, that report has a functional program in the realm of electronic
correspondence while the security of transmissions depends on the sacredness of the directions
of quantum mechanics. By the by, the writers likewise expressed that Quantum cryptography is
just used to create and spread an indispensable, not to transmit any importance information but
rather that cryptography is not quite the same as regular cryptographic frameworks. It depends
more on science, instead of number juggling, as a basic part of their wellbeing model. Quantum
cryptography utilizes late learning of science to build up a cryptosystem that cannot be
vanquished. This implies it is completely ensured against being traded off without information of
the sender or the recipient of the messages. The master of quantum cryptography is that it
disposes of the issue of key dispersion. An individual can propose a vital by sending a few
photons with subjective polarizations. That routine would then be able to be appropriately used
to deliver a progression of numbers (Acharya, Sajwan and Bhargava 2014). The technique is
known as quantum key appropriation. In the event that the fundamental component is blocked by
a spy, this truly is regularly found and it is of no result, since it is just an arrangement of
discretionary segments and could be disposed. The sender would then be able to transmit still
another key. After an indispensable has been firmly received, it works to a great degree well to
scramble a note that could be conveyed by outdated medium like telephone, email, or common
postal mail.
3.4 Practical application of the work
The authors Acharya, Sajwan and Bhargava (2014), has discussed about Quantum
cryptography in one of the sections of this paper, which is an innovation by which two
gatherings can secured framework correspondences by applying the wonders of quantum
material science. Thus, that report has a functional program in the realm of electronic
correspondence while the security of transmissions depends on the sacredness of the directions
of quantum mechanics. By the by, the writers likewise expressed that Quantum cryptography is
just used to create and spread an indispensable, not to transmit any importance information but
rather that cryptography is not quite the same as regular cryptographic frameworks. It depends
more on science, instead of number juggling, as a basic part of their wellbeing model. Quantum
cryptography utilizes late learning of science to build up a cryptosystem that cannot be
vanquished. This implies it is completely ensured against being traded off without information of
the sender or the recipient of the messages. The master of quantum cryptography is that it
disposes of the issue of key dispersion. An individual can propose a vital by sending a few
photons with subjective polarizations. That routine would then be able to be appropriately used
to deliver a progression of numbers (Acharya, Sajwan and Bhargava 2014). The technique is
known as quantum key appropriation. In the event that the fundamental component is blocked by
a spy, this truly is regularly found and it is of no result, since it is just an arrangement of
discretionary segments and could be disposed. The sender would then be able to transmit still
another key. After an indispensable has been firmly received, it works to a great degree well to
scramble a note that could be conveyed by outdated medium like telephone, email, or common
postal mail.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10LITERATURE SEARCH AND PAPER CRITIQUE
The authors of this paper have also illustrated on the various aspects that have to be taken
into consideration for selecting appropriate cryptographic scheme. Hence, this paper has a real
world application in the field of data and network security for network administrators and service
providers. The constraints for selection of appropriate cryptographic algorithm are illustrated as
below:
Time – This factor comprises of determining time that is required to encrypt as well as
decrypt data along with the time that is required for fulfilling the requirements before beginning
an encryption.
Memory – This constraint relates to the memory that is required especially for small and
smart gadgets such as PDA, smart card as well as RFID tags.
Security – This factor relates to the certain aspects like confidentially, integrity and
availability is being maintained by the encryption scheme that has been selected.
Nature of Data – This means importance of the data or information that is being
transmitted over a network. It is not that much important if it is small in size, then any encryption
scheme can be chosen and applied. If the data being transmitted is of utmost importance or it is
highly confidential then hybrid scheme that is symmetric + asymmetric have to be selected as the
suitable cryptographic scheme.
Moreover, Acharya, Sajwan and Bhargava (2014), have also presented the various
essential aspects upon which the performance of cryptographic algorithms are dependent as
below:
Tunability – It may be truly wanted to figure out how to powerfully decide the secured
part and the encryption parameters with respect to different applications and necessities. Settled
The authors of this paper have also illustrated on the various aspects that have to be taken
into consideration for selecting appropriate cryptographic scheme. Hence, this paper has a real
world application in the field of data and network security for network administrators and service
providers. The constraints for selection of appropriate cryptographic algorithm are illustrated as
below:
Time – This factor comprises of determining time that is required to encrypt as well as
decrypt data along with the time that is required for fulfilling the requirements before beginning
an encryption.
Memory – This constraint relates to the memory that is required especially for small and
smart gadgets such as PDA, smart card as well as RFID tags.
Security – This factor relates to the certain aspects like confidentially, integrity and
availability is being maintained by the encryption scheme that has been selected.
Nature of Data – This means importance of the data or information that is being
transmitted over a network. It is not that much important if it is small in size, then any encryption
scheme can be chosen and applied. If the data being transmitted is of utmost importance or it is
highly confidential then hybrid scheme that is symmetric + asymmetric have to be selected as the
suitable cryptographic scheme.
Moreover, Acharya, Sajwan and Bhargava (2014), have also presented the various
essential aspects upon which the performance of cryptographic algorithms are dependent as
below:
Tunability – It may be truly wanted to figure out how to powerfully decide the secured
part and the encryption parameters with respect to different applications and necessities. Settled

11LITERATURE SEARCH AND PAPER CRITIQUE
importance of secured part and secured parameters limits the ease of use of the framework to a
restricted gathering of uses.
Computational Speed – In a few ongoing applications, it is fundamental that the
encryption and unscrambling equations are rapidly enough to meet continuous necessities.
Basic Period Value – In the encryption systems the critical thing organization is the vital
perspective that uncovers how the information is scrambled. The photo lessening the encryption
extent is dependent on this vital length (Acharya, Sajwan and Bhargava 2014). The symmetric
calculation utilizes a variable urgent period which is of the more extended. Consequently, the
essential thing organization is a significant perspective in encryption preparing.
Encryption Percentage – The encryption extent is the measure of the measure of
information that will be encoded. Encryption extent should be diminished to decrease the trouble
on calculation.
Security Issues – Cryptographic wellbeing recognizes whether encryption framework is
ensured against savage power and different plaintext-figure content assault. For vital media
program, it is truly critical that the encryption framework must meet cryptographic security
which is surveyed in three levels as negligible, medium and high.
Hence, from the above discussions it can be said that the work being presented by the
authors has significant importance in the practical world with the emerging trends in digital
communication.
3.5 Presentation of the paper
The overall presentation of the paper is good and well-written article with an important
message for network administrators and organizations. Overall this article is very straightforward
importance of secured part and secured parameters limits the ease of use of the framework to a
restricted gathering of uses.
Computational Speed – In a few ongoing applications, it is fundamental that the
encryption and unscrambling equations are rapidly enough to meet continuous necessities.
Basic Period Value – In the encryption systems the critical thing organization is the vital
perspective that uncovers how the information is scrambled. The photo lessening the encryption
extent is dependent on this vital length (Acharya, Sajwan and Bhargava 2014). The symmetric
calculation utilizes a variable urgent period which is of the more extended. Consequently, the
essential thing organization is a significant perspective in encryption preparing.
Encryption Percentage – The encryption extent is the measure of the measure of
information that will be encoded. Encryption extent should be diminished to decrease the trouble
on calculation.
Security Issues – Cryptographic wellbeing recognizes whether encryption framework is
ensured against savage power and different plaintext-figure content assault. For vital media
program, it is truly critical that the encryption framework must meet cryptographic security
which is surveyed in three levels as negligible, medium and high.
Hence, from the above discussions it can be said that the work being presented by the
authors has significant importance in the practical world with the emerging trends in digital
communication.
3.5 Presentation of the paper
The overall presentation of the paper is good and well-written article with an important
message for network administrators and organizations. Overall this article is very straightforward
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





