Cryptography for Network and Data Security: A Comprehensive Report
VerifiedAdded on 2025/05/03
|3
|2147
|230
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

CRYPTOGRAPHY for NETWORK and DATA
SECURITY
ABSTRACT – Cryptography is seen as the technology
which is increasingly adopted by almost all the network
securities. The use of the computerized storage of the data
for processing and the transfer of the data has been
increasing. This needs high security as the personal or
sensitive information of the organization can be leaked.
Because of the advancements in the communication
protection between the businesses and organization, the use
of cryptography is also increasing. Cryptography is very
much important and needed in today’s network of
communication. So, as to protect the businesses by
providing protection to the emails and the transactions of
the business. Classical and modern cryptography uses a
different type of mathematical techniques and tools to help
with network security.
Keywords— cryptography, network security, data hiding
INTRODUCTION
It is being seen that with the growth of the internet, technology
is also growing fast. As more and more types of technology are
used to handle big data for larger organizations, more different
types of threats are occurring. These threats are related to the
malicious practice of data sharing without the knowledge of the
data owner. Cryptography is seen as an emerging tool or
technology which helps with the data hiding from hackers with
the use of encryption and decryption of data. Transferring of
files is made easy with the help of this. With the increased use
of data sharing platform, security threats have also increased.
This report will focus on solving these kinds of security threats
with the help of cryptography tools and techniques. Methods to
prevent these threats which will be discussed are
steganography, interest packet aggregation, perfect symmetric
cryptography technique.
RESEARCH PROBLEM
The research problem mainly focuses on the use of
cryptography tools, techniques, and algorithms to help the
larger organization with data sharing. This is done, so as to
prevent hackers from using the sensitive data of the company.
According to [1] threats to data, services, and virtual machines
are seen on a daily basis. Cryptography can be used at a larger
scale to help solve this problem. There are many cryptography
tools present for the encryption and decryption of data. But
choosing the best one from it, which is less complex and more
effective, also which requires less time is the main problem.
Other authors have also shown that cryptography can be used
to prevent a threat but for every threat, certain methods or
techniques of cryptography can be applied. Choosing the best
cryptography tool for data sharing among the organization
while making the process opaque for hackers is the main
motive.
RESEARCH JUSTIFICATION
Data security is very important for a person or an
organization. As any leak of sensitive data can cause a stir
in the organization. This type of misuse of data between the
organizations is known as a network threat. In other words,
it can be stated that unauthorized use of important files or
data which is being shared between the organizations is
network threat. Securing data with the use of cryptography
techniques is very much needed against hackers. So, to
protect oneself against these hackers, the implementation of
various cryptography techniques are required. This, in turn,
can further help in cyber threats which cause bank robbery
or any information leak to some terrorist group.
Cryptography methods which can help prevent more than
one threat are also seen. This was needed to be done so as
to protect one’s private data from hackers. These methods
are going to be elaborated in this research.
LITERATURE REVIEW
The research is based on the use of cryptographic tools,
techniques, and models which are used to store and protect the
data from the security breaches on the cloud. The use of
cryptography algorithms is increasing as it is considered as one
of the best techniques to protect the system.. The cryptography
tools are also used in technologies which are used to store the
data on the cloud. Therefore, the cryptography algorithms are
not only used to protect the data but are also used to save and
update the data on the cloud. These technologies include
blockchain technology which saves the data in blocks to
prevent high data loss when data is breached.
According to [1], the work of research is related to the
technique of steganography which is used as a tactic to transfer
the confidential information to the authorized recipient through
the most dependent safety measures. Using this technique
avoids data security breaches on the cloud network system. The
data is protected using the techniques which prevent the
communication medium related security issues. The research
helps to determine the importance of the steganography in
improvising the techniques for the data integration,
confidentiality, and verification of the cloud system. The
approach mentioned in the research is tested and goes through
several stages of the steganography analysis. Such analysis
provides the data of the attacks on the system which uses
various techniques like chi-square, histogram, and visualization
in the system. The major drawback of the research is
considered as the data embedding techniques which needs to
attain improvements for the cloud system network and the
future work of the author is dependent and dedicated to this
issue.
Furthermore [2], in the words of the author, the research mainly
focuses on providing the communication networks that are used
in the cloud system with a secure connection through
cryptographic and steganographic algorithms, tools and
techniques. These techniques usually deal for providing the
data transmission of the cloud network with a secure path
through which are data can be shared with the user. Also, the
research provides and elaborates the working of the
steganographic techniques in the system. These techniques are
generally used to perform the data hiding of the data in the
system. The technique hides the information in a file that is
covered; the file type is usually an image. The data in this
SECURITY
ABSTRACT – Cryptography is seen as the technology
which is increasingly adopted by almost all the network
securities. The use of the computerized storage of the data
for processing and the transfer of the data has been
increasing. This needs high security as the personal or
sensitive information of the organization can be leaked.
Because of the advancements in the communication
protection between the businesses and organization, the use
of cryptography is also increasing. Cryptography is very
much important and needed in today’s network of
communication. So, as to protect the businesses by
providing protection to the emails and the transactions of
the business. Classical and modern cryptography uses a
different type of mathematical techniques and tools to help
with network security.
Keywords— cryptography, network security, data hiding
INTRODUCTION
It is being seen that with the growth of the internet, technology
is also growing fast. As more and more types of technology are
used to handle big data for larger organizations, more different
types of threats are occurring. These threats are related to the
malicious practice of data sharing without the knowledge of the
data owner. Cryptography is seen as an emerging tool or
technology which helps with the data hiding from hackers with
the use of encryption and decryption of data. Transferring of
files is made easy with the help of this. With the increased use
of data sharing platform, security threats have also increased.
This report will focus on solving these kinds of security threats
with the help of cryptography tools and techniques. Methods to
prevent these threats which will be discussed are
steganography, interest packet aggregation, perfect symmetric
cryptography technique.
RESEARCH PROBLEM
The research problem mainly focuses on the use of
cryptography tools, techniques, and algorithms to help the
larger organization with data sharing. This is done, so as to
prevent hackers from using the sensitive data of the company.
According to [1] threats to data, services, and virtual machines
are seen on a daily basis. Cryptography can be used at a larger
scale to help solve this problem. There are many cryptography
tools present for the encryption and decryption of data. But
choosing the best one from it, which is less complex and more
effective, also which requires less time is the main problem.
Other authors have also shown that cryptography can be used
to prevent a threat but for every threat, certain methods or
techniques of cryptography can be applied. Choosing the best
cryptography tool for data sharing among the organization
while making the process opaque for hackers is the main
motive.
RESEARCH JUSTIFICATION
Data security is very important for a person or an
organization. As any leak of sensitive data can cause a stir
in the organization. This type of misuse of data between the
organizations is known as a network threat. In other words,
it can be stated that unauthorized use of important files or
data which is being shared between the organizations is
network threat. Securing data with the use of cryptography
techniques is very much needed against hackers. So, to
protect oneself against these hackers, the implementation of
various cryptography techniques are required. This, in turn,
can further help in cyber threats which cause bank robbery
or any information leak to some terrorist group.
Cryptography methods which can help prevent more than
one threat are also seen. This was needed to be done so as
to protect one’s private data from hackers. These methods
are going to be elaborated in this research.
LITERATURE REVIEW
The research is based on the use of cryptographic tools,
techniques, and models which are used to store and protect the
data from the security breaches on the cloud. The use of
cryptography algorithms is increasing as it is considered as one
of the best techniques to protect the system.. The cryptography
tools are also used in technologies which are used to store the
data on the cloud. Therefore, the cryptography algorithms are
not only used to protect the data but are also used to save and
update the data on the cloud. These technologies include
blockchain technology which saves the data in blocks to
prevent high data loss when data is breached.
According to [1], the work of research is related to the
technique of steganography which is used as a tactic to transfer
the confidential information to the authorized recipient through
the most dependent safety measures. Using this technique
avoids data security breaches on the cloud network system. The
data is protected using the techniques which prevent the
communication medium related security issues. The research
helps to determine the importance of the steganography in
improvising the techniques for the data integration,
confidentiality, and verification of the cloud system. The
approach mentioned in the research is tested and goes through
several stages of the steganography analysis. Such analysis
provides the data of the attacks on the system which uses
various techniques like chi-square, histogram, and visualization
in the system. The major drawback of the research is
considered as the data embedding techniques which needs to
attain improvements for the cloud system network and the
future work of the author is dependent and dedicated to this
issue.
Furthermore [2], in the words of the author, the research mainly
focuses on providing the communication networks that are used
in the cloud system with a secure connection through
cryptographic and steganographic algorithms, tools and
techniques. These techniques usually deal for providing the
data transmission of the cloud network with a secure path
through which are data can be shared with the user. Also, the
research provides and elaborates the working of the
steganographic techniques in the system. These techniques are
generally used to perform the data hiding of the data in the
system. The technique hides the information in a file that is
covered; the file type is usually an image. The data in this
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

research is saved as of an image format. Various techniques
like MATLAB 12, Mean Absolute Error (MAE), and Mean
Square Error (MSE) are used in the system to find the detailing
of the minor factors of that can affect the proposed system. The
major disadvantage and future work of the research are related
to the use of these techniques in the large and complex cloud
computing networks.
In the words of [3], the framework of the research is based on
the elliptic curve cryptography which is used for the system to
prevent it from the data breaches in the Content-Centric
Network (CNN). The research possesses a solution towards the
use of this cryptography technique in the technological
enhancement and advancement for sharing the cloud data
through secure data transmission paths. The techniques used in
the system focuses on the information exchange of the data and
information on the cloud network. In this, the CNN network is
used as the basic infrastructure which is used to describe the
working of the framework of the system. The CNN model
possesses features like interest packet aggregation and content
caching which helps in secure data transmission and protects
the policies of the publication which shares the data with the
reader or the user. The future work is related to improve the
limitation of the research which includes the computation and
communication efficiency of the proposed scheme in the CNN
network.
According to [5], the research is based on the working model of
communication and internet technologies of the cloud
computing data. It includes the use of the cryptography models
in the infrastructure of the TCP/IP protocol layers which are
used to transmit the data in the system network. The digital
communication techniques are used in increasing manner and
the use of cryptography techniques helps to restore the basic
architecture of the proposed system. In the research, the Named
data network is being used which carries the data of each user
and provides which the access to the data through various
authentication and authorization techniques. The Named data
network (NDN) is used to secure the FTP (file transfer
protocol) in the TCP/IP protocol layers. The files are broken
when the authentication of the data is done by using the wrong
credentials. The major drawback of the research is the use of
NDN network as it is an alternative network used for the
system and new to be used and definitely has a lot of scope for
improvements which shall be conducted in the future work of
the research.
Furthermore [6], as per the words of the author, the research is
based on the use of cryptography algorithms in the security
measures which are used to measure the data efficiency of the
communication techniques of the IoT communication network.
The cryptography algorithms in the system are used to describe
the data breach security measures for the proposed IoT
communication network. The use of this technique is also used
in smart devices, sensors, and devices which can collect a huge
amount of data on their own in the network from the users. The
cryptography techniques used in the proposed system
guarantees the dependency of the security measures on the type
of device and the application used to store the data on the
cloud. The system also includes the working of a cyber-
physical system and the major drawback for the proposed
system is the unknown use os the cryptography tools in cyber-
physical attacks and the future work of the author is related to
it.
In the words of the author, the research is focused on the key
generation and encryption models for securing the data on the
cloud using the cryptographic algorithms and techniques. In the
research studied, the cryptography tools are used in the system
to determine the key encryption techniques which are used to
protect the data. The key encryption is used as an
authentication method for the data transmission. The secure
transmission of the data depends on the cryptography
algorithms. The research has helped to find the use of
cryptographic techniques in the neural network for transmitting
the data. The major drawback and future work of the author are
related to the limitations caused in this research which includes
the implementation of the cryptographic techniques in deep
learning techniques for advanced solutions.
PROPOSED DESIGN
FIGURE 1 STATE OF ART DIAGRAM FOR CRYPTOGRAPHY
TECHNIQUE
like MATLAB 12, Mean Absolute Error (MAE), and Mean
Square Error (MSE) are used in the system to find the detailing
of the minor factors of that can affect the proposed system. The
major disadvantage and future work of the research are related
to the use of these techniques in the large and complex cloud
computing networks.
In the words of [3], the framework of the research is based on
the elliptic curve cryptography which is used for the system to
prevent it from the data breaches in the Content-Centric
Network (CNN). The research possesses a solution towards the
use of this cryptography technique in the technological
enhancement and advancement for sharing the cloud data
through secure data transmission paths. The techniques used in
the system focuses on the information exchange of the data and
information on the cloud network. In this, the CNN network is
used as the basic infrastructure which is used to describe the
working of the framework of the system. The CNN model
possesses features like interest packet aggregation and content
caching which helps in secure data transmission and protects
the policies of the publication which shares the data with the
reader or the user. The future work is related to improve the
limitation of the research which includes the computation and
communication efficiency of the proposed scheme in the CNN
network.
According to [5], the research is based on the working model of
communication and internet technologies of the cloud
computing data. It includes the use of the cryptography models
in the infrastructure of the TCP/IP protocol layers which are
used to transmit the data in the system network. The digital
communication techniques are used in increasing manner and
the use of cryptography techniques helps to restore the basic
architecture of the proposed system. In the research, the Named
data network is being used which carries the data of each user
and provides which the access to the data through various
authentication and authorization techniques. The Named data
network (NDN) is used to secure the FTP (file transfer
protocol) in the TCP/IP protocol layers. The files are broken
when the authentication of the data is done by using the wrong
credentials. The major drawback of the research is the use of
NDN network as it is an alternative network used for the
system and new to be used and definitely has a lot of scope for
improvements which shall be conducted in the future work of
the research.
Furthermore [6], as per the words of the author, the research is
based on the use of cryptography algorithms in the security
measures which are used to measure the data efficiency of the
communication techniques of the IoT communication network.
The cryptography algorithms in the system are used to describe
the data breach security measures for the proposed IoT
communication network. The use of this technique is also used
in smart devices, sensors, and devices which can collect a huge
amount of data on their own in the network from the users. The
cryptography techniques used in the proposed system
guarantees the dependency of the security measures on the type
of device and the application used to store the data on the
cloud. The system also includes the working of a cyber-
physical system and the major drawback for the proposed
system is the unknown use os the cryptography tools in cyber-
physical attacks and the future work of the author is related to
it.
In the words of the author, the research is focused on the key
generation and encryption models for securing the data on the
cloud using the cryptographic algorithms and techniques. In the
research studied, the cryptography tools are used in the system
to determine the key encryption techniques which are used to
protect the data. The key encryption is used as an
authentication method for the data transmission. The secure
transmission of the data depends on the cryptography
algorithms. The research has helped to find the use of
cryptographic techniques in the neural network for transmitting
the data. The major drawback and future work of the author are
related to the limitations caused in this research which includes
the implementation of the cryptographic techniques in deep
learning techniques for advanced solutions.
PROPOSED DESIGN
FIGURE 1 STATE OF ART DIAGRAM FOR CRYPTOGRAPHY
TECHNIQUE

TABLE 1 CLASSIFICATION TABLE FOR ALL THE AUTHORS
CONCLUSION
In this paper, the research is being focused on the use of the
cryptography algorithms to prevent the system from the data
breaches. The use of the cryptography algorithms are described
in the research and also the areas of the work are elaborated.
The cryptography tools and techniques are used in the cloud
computing system to prevent the data from the security
breaches and also it provides various secure data transmission
techniques from the system. The main aim of the research is to
use these cryptography techniques and explain the usefulness
of these techniques and algorithms in the cloud. The
cryptography algorithms are also used in the blockchain
technology for the secure storing of the data on the cloud
system. Also, the research shows the compatibility of these
techniques with all kinds of data types in the network. The
implementation of these algorithms in complex and neural
networks can be considered as future work.
REFERENCES
[1] R. Shanthakumari and S. Malliga, "Dual layer security of data
using LSB inversion image steganography with elliptic curve
cryptography encryption algorithm", Multimedia Tools and
Applications, 2019.
[2] Y. Jain, G. Sharma, G. Anand and S. Dhall, "A Hybrid Security
Mechanism Based on DCT and Visual Cryptography for Data
Communication Networks", Advances in Intelligent Systems and
Computing, pp. 131-142, 2018.
[3] S. Adhikari, S. Ray, G. Biswas and M. Obaidat, "Efficient and
secure business model for content centric network using elliptic
curve cryptography", International Journal of Communication
Systems, vol. 32, no. 1, p. e3839, 2018.
[4] Y. Tseng, C. Fan and Y. Cho, "An authenticated re-encryption
scheme for secure file transfer in named data
networks", International Journal of Communication Systems, vol.
31, no. 11, p. e3571, 2018.
[5] C. Bodei, S. Chessa and L. Galletta, "Measuring security in IoT
communications", Theoretical Computer Science, vol. 764, pp.
100-124, 2019.
[6] L. Zhou, J. Chen, Y. Zhang, C. Su and M. Anthony James,
"Security analysis and new models on the intelligent symmetric
key encryption", Computers & Security, vol. 80, pp. 14-24,
2019.
S.
No.
Author’s
Name
Cryptography
techniques
Algorithms
used
Tools used Equation used Efficiency
increased
1 Shanthakumari
and Malliga
(2019)
steganography ECC
algorithm
Chi-square
Helps in finding out the Structural Similarity Index
Matrix
78.3%
2 Jain Sharma
Anand and
Dhall (2018)
LSB
steganography
Blowfish MATLAB-
12
Gives the peak signal note ratio
76.5%
3 Adhikari Ray
Biswas and
Obaidat (2018)
Interest packet
aggregation
polynomial
time
algorithm
virtual
protocol
simulation
Gives message meaning rule
81.3%
4 Tseng Fan
and Cho
(2018)
Identity‐Based
Proxy Re‐
Encryption
(IBPRE)
scheme
polynomial
time
algorithm
JCA tool
Helps in the encrypting of data
77.9%
5 Bodei Chessa
and Galletta
(2019)
Perfect
symmetric
cryptography
technique
RSA
algorithm
IOT-LySa
For measuring the energy
69.9%
6 Zhou Chen
Zhang Su and
Anthony
James (2019)
secure tunnel
technique
key
schedule
algorithm
NIST
statistical
tool
Helps in the hypothesis testing
82.4%
CONCLUSION
In this paper, the research is being focused on the use of the
cryptography algorithms to prevent the system from the data
breaches. The use of the cryptography algorithms are described
in the research and also the areas of the work are elaborated.
The cryptography tools and techniques are used in the cloud
computing system to prevent the data from the security
breaches and also it provides various secure data transmission
techniques from the system. The main aim of the research is to
use these cryptography techniques and explain the usefulness
of these techniques and algorithms in the cloud. The
cryptography algorithms are also used in the blockchain
technology for the secure storing of the data on the cloud
system. Also, the research shows the compatibility of these
techniques with all kinds of data types in the network. The
implementation of these algorithms in complex and neural
networks can be considered as future work.
REFERENCES
[1] R. Shanthakumari and S. Malliga, "Dual layer security of data
using LSB inversion image steganography with elliptic curve
cryptography encryption algorithm", Multimedia Tools and
Applications, 2019.
[2] Y. Jain, G. Sharma, G. Anand and S. Dhall, "A Hybrid Security
Mechanism Based on DCT and Visual Cryptography for Data
Communication Networks", Advances in Intelligent Systems and
Computing, pp. 131-142, 2018.
[3] S. Adhikari, S. Ray, G. Biswas and M. Obaidat, "Efficient and
secure business model for content centric network using elliptic
curve cryptography", International Journal of Communication
Systems, vol. 32, no. 1, p. e3839, 2018.
[4] Y. Tseng, C. Fan and Y. Cho, "An authenticated re-encryption
scheme for secure file transfer in named data
networks", International Journal of Communication Systems, vol.
31, no. 11, p. e3571, 2018.
[5] C. Bodei, S. Chessa and L. Galletta, "Measuring security in IoT
communications", Theoretical Computer Science, vol. 764, pp.
100-124, 2019.
[6] L. Zhou, J. Chen, Y. Zhang, C. Su and M. Anthony James,
"Security analysis and new models on the intelligent symmetric
key encryption", Computers & Security, vol. 80, pp. 14-24,
2019.
S.
No.
Author’s
Name
Cryptography
techniques
Algorithms
used
Tools used Equation used Efficiency
increased
1 Shanthakumari
and Malliga
(2019)
steganography ECC
algorithm
Chi-square
Helps in finding out the Structural Similarity Index
Matrix
78.3%
2 Jain Sharma
Anand and
Dhall (2018)
LSB
steganography
Blowfish MATLAB-
12
Gives the peak signal note ratio
76.5%
3 Adhikari Ray
Biswas and
Obaidat (2018)
Interest packet
aggregation
polynomial
time
algorithm
virtual
protocol
simulation
Gives message meaning rule
81.3%
4 Tseng Fan
and Cho
(2018)
Identity‐Based
Proxy Re‐
Encryption
(IBPRE)
scheme
polynomial
time
algorithm
JCA tool
Helps in the encrypting of data
77.9%
5 Bodei Chessa
and Galletta
(2019)
Perfect
symmetric
cryptography
technique
RSA
algorithm
IOT-LySa
For measuring the energy
69.9%
6 Zhou Chen
Zhang Su and
Anthony
James (2019)
secure tunnel
technique
key
schedule
algorithm
NIST
statistical
tool
Helps in the hypothesis testing
82.4%
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.


