SlideShare a Scribd company logo
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
Network Security and Analysis of Crypography Mechanism: Case Study
Method
SALAUDDIN,TOWSIF, 17-33837-1 sec:B Dept:CS American International University Bangladesh
TANZIN-UL-ISLAM MD., 17-33958-1 sec:B CS American International University Bangladesh
IMRAN,FARDIN AHSAN, 17-33846-1 sec:B CS American International University Bangladesh
Network security has turned out to be the most concerning issue with the enlargement of computer network technology in the
last few decades. Organizations, individuals became more conscious regarding the matter of network security and wants to secure
their information from the unauthorized persona. Therefore, network security caught the attention of the research community
and much research was conducted in this sector. As a result, those efforts yield numerous methods to secure the network. Among
those techniques, cryptography is one of the most popular and accepted method. This paper attempts to provide an overview of the
cryptography technique thoroughly after studying 10 papers systematically which were published in pertinent venues. The study
result provides the pros and cons of cryptography, identifies incapacities and opportunities, and future possibilities.[? ? , 2]1
CCS Concepts: • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks →
Network reliability.
Additional Key Words and Phrases: datasets, neural networks, gaze detection, text tagging
ACM Reference Format:
Salauddin,Towsif, Tanzin-Ul-Islam Md., and Imran,Fardin Ahsan. . Network Security and Analysis of Crypography Mechanism: Case
Study Method. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY. ACM, New York, NY,
USA, 6 pages. https://doi.org/10.1145/1122445.1122456
1 INTRODUCTION
The enlargement of network and information technology caused associations and individuals to join the internet. which
results in a tremendous amount of data transmission over the network every day. If data in the network is hijacked by
unauthorized persona it can bring harm to individuals and organizations. To restrict data plunder in network layer
multiple network security techniques have been developed. Among them, cryptography is the most accepted method in
the present world as the other conventional methods failed to provide information security in the network In general,
cryptography is a process that hides data from unauthorized persons. It provides information security in the network
by encrypting plain text which can be decrypted only by keys that are shared between the sender and receiver. So
even if the data get stripped from the network, hacker or wicked user won’t be able to read the massage. There are
two standards of cryptography one is symmetric cryptography and the other one is asymmetric cryptography. Both
types of cryptography use a common key which is known as public key but asymmetric cryptography uses another
special type of key which is known as the private key and unique for each user. Despite some drawbacks, cryptography
provides confidentiality, integrity, non-repudiation and authentication facilities.[1][6]
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components
of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to
redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
© Association for Computing Machinery.
Manuscript submitted to ACM
1
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
Woodstock ’18, June 03–05, 2018, Woodstock, NY
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
2 RESEARCH METHODOLOGY
.
2.1 Research Objective
Network security is one of the most concern topic in recent times because of vast usage of computer in every sector
in our life. So securing these devices from any unauthorized users or activity to protect the data and information is
very difficult task. But to secure these networks and devices cryptography is a most promising and rapidly growing
technology which is very much trust worthy and rapidly deployed technology. The main objective of this paper is to
analyze and identify the working mechanism of cryptography, its type symmetric and asymmetric cryptography, their
limitations, cryptographic attacks and future of cryptography.[7]
2.2 Research Questions
2.2.1 What is the importance of network security in modern world?
2.2.2 What are the basic terminologies of cryptography?
2.2.3 How cryptography is more secure in contrast to other network security techniques?
2.2.4 what are the differences between symmetric cryptography and asymmetric cryptography?
2.2.5 what is the disadvantages of Cryptography?
2.3 Article Section
2.4 Keywords and Search String:
It is the initial step of selecting articles after choosing the research domain and topic. Our topic is ‘Cryptography’ so we
at first search with the keyword cryptography which resulted in showing a few articles on cryptography which was not
covering the whole process of cryptography. After that, we search using strings like ‘network security: cryptography’,
‘literature review on cryptography’, ‘techniques of hiding information’, ‘research on cryptography’. From the search
results, we collected our papers.[8]
2.5 Digital Libraries To Search:
To attain relevant article, we searched on popular sites like ‘Google Scholar’, ‘Research Gate’, ‘Institute of Electrical and
Electronics Engineers (IEEE)’, ‘Association for Computing Machinery (ACM)’.
2.6 Keyword Search and Manual Selection:
With automated keyword search lots of articles were found and few of them didn’t match to our topic for this we have
to manually select the papers which were specificly related to our topic. After selecting few articles we again shorted
our list in oder to select only those articles which are more relevant to our topic.
2.7 Final Set of Articles:
After manual selection we selected our final set of articles which we are going to use as reference. We used the final set
of articles to carry out our research.
2
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
3 DISCUSSION:
3.1 What is the importance of network security in modern world?
Ans:In this modern world the important aspect is network security over the internet. For protecting client data an
efficient, stable, strong network security is needed. Network security also prevent the data from sabotage and hacker. It
also protects any network consisting of huge number of pc from harmful spyware. It can make sure that the data which
is shared is safe and secure.To ensure network security cryptography technique is used. Cryptography is a technique
that ensures the data packet is secured or not hacked by unauthorized individuals from the network layer and data link
layer.[4]
3.2 . What are the basic terminologies of cryptography?
Ans: Although there are two types of cryptography most of the term are same for both types. To apply cryptography
first we need a plain text. A plain text is a file that contains information that is going to be encrypted before transmitting.
Encryption algorithm is another basic term in cryptography it is nothing but a mathematical process that converts plain
text into cipher text. Plain text and encryption key is used as the input of the procedure. Cipher text is the encryption
version of plain text which produced by encryption algorithm. Encryption key is the special that is given as input by
the sender in encryption algorithm, whereas decryption key is the special key that is given input by the receiver as
input in decryption algorithm. Decryption algorithm also in nothing but mathematical process that produces plain text
from the cipher text. These are the basic terminologies of cryptography.[7]
3.3 How cryptography is more secure in contrast to other network security techniques?
Ans: Cryptography encrypt data or plain text converting it into cipher text before transmitting the data over the
network. The cipher text can only be decrypted at the receiver end. Even if the data gets intercepted from the network
in can’t be modified or changed by the hacker or malicious individuals. Moreover, hackers can’t read the data because
to decrypt the data it needs secret key which only known to the receiver. So, there is no chance of stealing data from
network layer. Where firewall, access control, antivirus software, network segmentation etc. techniques only provides
security in host computers but the network layers remain unsecure and data can be intercepted and modified in the
network layer by the hackers, whereas cryptography ensures network layer safety. In addition, cryptography provides
condentiality, integrity, non-repudiation, authentication which are the basic goals of secure network.[3]
3.4 what are the differences between symmetric cryptography and asymmetric cryptography?
Ans: Symmetric cryptography and asymmetric cryptography both almost uses same mechanism to encrypt and decrypt
data but asymmetric uses a pair of unique keys which is known as private key. For symmetric encryption and decryption
of a plain text is done with similar key (public key). But asymmetric encryption and decryption of a plain text is done
with similar public key and a pair of private keys which is dissimilar for every user. Although the public key remains
same for both sender and receiver in asymmetric cryptography.[1]
3.5 what is the disadvantages of Cryptography?
Ans: Though cryptography ensures data safety it has few drawbacks. It wastes time to encrypt and decrypt plain text.
This process won’t a valid user to access data if user forgets his/her key. Cryptography is weak against brute force
attack. Implementation of cryptography is costly. Moreover, it doesn’t protect against the vulnerabilities and threats
3
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
Woodstock ’18, June 03–05, 2018, Woodstock, NY
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
generated from poor system design. Encryption and decryption is nothing but mathematical process any mistake in
mathematical term will result in system breakdown.[9]
4 FUTURE OF CRYPTOGRAPHY:
To keep up with the modern needs in information cryptography is also evolving and enhancing.
4.1 Homomorphic encryption:
Homomorphic encryption is a new ecryption technology. In this technology users are allowed to process data without
decrypting it. With the help of homomorphic encryption encrypted data can be processed and encrypted result might
be produced.
4.2 Hardware-based whole disk encryption:
In this encryption technology after given a key the whole contents of a volume encrypts it after it is used. But this
technology might fall against networks attacks via mail or websites .It only protect data if a laptop or a device is being
stolen and it requires a key to decrypt such kind of data.[10]
4.3 Moving target defense:
The most common problem faced by data security is not whether or not data is encrypted, it’s because of users use the
same code as the attackers. In this kind of case moving target defense can be great helpful. The technique used in this
process is that here the attack surface is constantly changed as a result attackers are not able to spend time reverse
engineering user environment.
4.4 Block Chain:
This technology is used to secure crypto-currencies like bit-coin and Ethereum. It can be used as a strong weapon
against cyber threats. When block-chain technology is applied to cyber-security models, to increases target fungibility
all the lights are turned on. This helps to prevent making fake identification. This technology might become a very
powerful tool for IOT.[2]
4.5 Quantum cryptography
For transmitting a secret key or password over a distance this is the only proven or verified method. To physically move
a common file between two parties it uses photons of light. Concern is that this photons of light might be intercepted
with each other but it is ensured that this data or information can’t be cloned or copied.[5]
5 VALIDITY THREAT:
5.1 Selection of Article:
The articles were selected according to research related topic. The articles were searched by the keywords then among
the various articles only the most relevant to our topic articles were selected manually by all the authors.[1]
4
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
5.2 Experimenter bias:
All the researcher agreed upon the references that are being used for this paper. To avoid inadvertently conflicts between
members all the researchers communicate with each other until the end of the research.[9]
5.3 Data Falsification:
All the data used on this research paper are valid. Data provided in this paper are collected from the previous researches
conducted on this topic and the reference of those paper are given correctly.[4]
6 CONCLUSION:
In this modern era of technology everyone transfers information or data to others through technology. People like us
transfer information or receive information with risk. For different reason we take the advantage of Internet when we
emit data or get the data, but the main issue is that the data are transferred or received by people may be accessed by
hacker or unauthorized user out there in cyberspace. So, data security should be the main thought to all Internet users.
There needs digital keys and proper protection for the Cryptography to make sure that the data has been transferred to
the receiver side is safe and secure. In that case Encryption decryption technique should be applied in such a way so
that a professional hacker can’t get the information at any cost. We need to modify our information into hard-reading
forms so that the information that transferred is secured and will get to the target safely. Nowadays, we are having
the risk of security in data that’s why we need a tight security to secure us from the hacker and also improve the
cryptography techniques or methods because the cyber criminals are becoming smarter day by day.[4]
REFERENCES
[1] Sattam S Al-Riyami and Kenneth G Paterson. [n.d.]. Certificateless public key cryptography. ([n. d.]). 146.https://ijcsmc.com/docs/papers/July2017/
V6I7201732.pdf
[2] Antonio, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. [n.d.]. Device-independent security of quantum
cryptography against collective attacks. ([n. d.]).
[3] Dr. Pankaj Gupta Deepak Goyal Monika Goyal. Dr. Sandeep Tayal, Dr. Nipin Gupta. 2017.. A Review paper on Network Security and Cryptography.
(2017.).
[4] ennifer Rowley. [n.d.]. Using Case Studies in Research. ([n. d.]).
[5] Sanjay Bhargava Kritika Acharya, Manisha Sajwan. [n.d.]. Analysis of Cryptographic Algorithms for Network Security. ([n. d.]).
[6] Shyam Nandan Kumar. 2015. Review on Network Security and Cryptography. (2015).
[7] SMohammad Tanveer Khan.2017. Review: Network Security Mechanisms and Cryptography. 2017.. Computer Science and Mobile Computing.
(2017.).
[8] William Stallings. [n.d.]. Cryptography and Network Security. ([n. d.]).
[9] ANDROID TUTORIAL. [n.d.]. Importanceo fC ryptoдraphyi nI nf ormationS ecurity.([n. d.]).
[10] John Viega, Matt Messier, and Pravir Chandra. [n.d.]. Network security with openSSL: cryptography for secure communications. ([n. d.]).
A A CONTRIBUTION RECORD:
A.1 A.1 Paper Assesment:
A.2 A.2 Paper writing contribution:
5
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
Woodstock ’18, June 03–05, 2018, Woodstock, NY
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
Student id & name Paper No
from Ref
Paper Title
17-33837-1
Salauddin,Towsif [3],[6],[7],[8] A Review paper on Network Security and Cryp-
tography, Review on Network Security and
Cryptography,Review: Network Security Mech-
anisms and Cryptography,Cryptography and
Network Security Cryptography
17-33958-1
Tanzin-Ul-Islam Md. [1],[2],[4],[9] Certificateless public key cryptography, Device-
independent security of quantum cryptog-
raphy against collective attacks,sing Case
Studies in Research,sing Case Studies in Re-
search,Cryptography and network security
17-33846-1
Imran,Fardin Ahsan [5],[10] Analysis of Cryptographic Algorithms for Net-
work Security,Network security with openSSL:
cryptography for secure communications.
Table 1. Paper collected and read by the group member
Student id & name Section No Section Title
17-33837-1
Salauddin,Towsif 1,2.2.3,2.2.4,2.3.1,
2.3.2,3.3,3.4,5.1,
4.4,4.5
Abstract,Introduction,Keyword and search
string,Digital libraries to search, How cryp-
tography is more secure in contrast to other
network security techniques?,what are the
differences between symmetric cryptography
and asymmetric cryptography?,Selection of
articles,Block Chain, Quantum cryptography
17-33958-1
Tanzin-Ul-Islam Md. 2.1,2.2.2,2.2.5,5.2,
4.1,4.2
Research Objective, What are the basic termi-
nologies of cryptography?what is the disad-
vantages of Cryptography? Keyword Search
and Manual Selection,Final Set of Articles,
Experimenter bias, Homomorphic encryption,
Hardware-based whole disk encryption
17-33846-1
Imran,Fardin Ahsan 5.3,6,3.1,2.2.1 Data falsification.conclusion, What is the im-
portance of network security in modern world?
Table 2. Section(s) Written in the paper by the group member
6

More Related Content

PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
PDF
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
PDF
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
 
PDF
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
PDF
Advanced Multi-Encryption Technique in Cloud Computing
AM Publications
 
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Tương Hoàng
 
PDF
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
PDF
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IJECEIAES
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
Advanced Multi-Encryption Technique in Cloud Computing
AM Publications
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Tương Hoàng
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IJECEIAES
 

What's hot (20)

PPTX
To use the concept of Data Mining and machine learning concept for Cyber secu...
Nishant Mehta
 
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
PDF
IRJET- Security from Threats of Computer System
IRJET Journal
 
PDF
Intrusion Detection Techniques In Mobile Networks
IOSR Journals
 
PDF
7215nsa05
Shivanand Manjaragi
 
PDF
Comprehensive survey of possible
IJNSA Journal
 
PDF
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
PDF
Constructing a predictive model for an intelligent network intrusion detection
Alebachew Chiche
 
PDF
Network security
nageshkanna13
 
PDF
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 
PDF
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
 
PDF
Bg34369370
IJERA Editor
 
PDF
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
PDF
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
PDF
FINAL PROJECT Dean Kay
Dean Kay
 
PDF
Residential access control system using QR code and the IoT
IJECEIAES
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
Nishant Mehta
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET Journal
 
Intrusion Detection Techniques In Mobile Networks
IOSR Journals
 
Comprehensive survey of possible
IJNSA Journal
 
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
Constructing a predictive model for an intelligent network intrusion detection
Alebachew Chiche
 
Network security
nageshkanna13
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
 
Bg34369370
IJERA Editor
 
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
FINAL PROJECT Dean Kay
Dean Kay
 
Residential access control system using QR code and the IoT
IJECEIAES
 
Ad

Similar to Literature review on cryptography (20)

PDF
chapter 1-4.pdf
zerihunnana
 
PDF
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
PDF
Chapter 1 2
Baggam Sailusha
 
PPT
CNS Unit-I_final.ppt
SwapnaPavan2
 
PPTX
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
PDF
A Review on Various Methods of Cryptography for Cyber Security
rahulmonikasharma
 
PPTX
Information Assurance and Security all in One Handout.pptx
fernandezpineda1016
 
PPT
Sunanda cryptography ppt
Soma Subbama
 
PDF
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
PPTX
PRESENTATION ON CRYPTOGRAPHY.pptx
RiddhiGupta84
 
PPTX
Network security & cryptography
Rahulprasad Yadav
 
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
PPTX
Seminar Information Protection & Computer Security (Cryptography).pptx
umardanjumamaiwada
 
PDF
Survey Paper: Cryptography Is The Science Of Information Security
CSCJournals
 
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
PDF
Cryptography-PART-1.pdf,taught in nitw 2025
kc22csb0a13
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PPTX
Network security and cryptography
Pavithra renu
 
PPT
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
PPTX
groupWork.pptx
KennedyKiplangat1
 
chapter 1-4.pdf
zerihunnana
 
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Chapter 1 2
Baggam Sailusha
 
CNS Unit-I_final.ppt
SwapnaPavan2
 
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
A Review on Various Methods of Cryptography for Cyber Security
rahulmonikasharma
 
Information Assurance and Security all in One Handout.pptx
fernandezpineda1016
 
Sunanda cryptography ppt
Soma Subbama
 
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
PRESENTATION ON CRYPTOGRAPHY.pptx
RiddhiGupta84
 
Network security & cryptography
Rahulprasad Yadav
 
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
Seminar Information Protection & Computer Security (Cryptography).pptx
umardanjumamaiwada
 
Survey Paper: Cryptography Is The Science Of Information Security
CSCJournals
 
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Cryptography-PART-1.pdf,taught in nitw 2025
kc22csb0a13
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Network security and cryptography
Pavithra renu
 
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
groupWork.pptx
KennedyKiplangat1
 
Ad

Recently uploaded (20)

PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
The Future of Artificial Intelligence (AI)
Mukul
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 

Literature review on cryptography

  • 1. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 Network Security and Analysis of Crypography Mechanism: Case Study Method SALAUDDIN,TOWSIF, 17-33837-1 sec:B Dept:CS American International University Bangladesh TANZIN-UL-ISLAM MD., 17-33958-1 sec:B CS American International University Bangladesh IMRAN,FARDIN AHSAN, 17-33846-1 sec:B CS American International University Bangladesh Network security has turned out to be the most concerning issue with the enlargement of computer network technology in the last few decades. Organizations, individuals became more conscious regarding the matter of network security and wants to secure their information from the unauthorized persona. Therefore, network security caught the attention of the research community and much research was conducted in this sector. As a result, those efforts yield numerous methods to secure the network. Among those techniques, cryptography is one of the most popular and accepted method. This paper attempts to provide an overview of the cryptography technique thoroughly after studying 10 papers systematically which were published in pertinent venues. The study result provides the pros and cons of cryptography, identifies incapacities and opportunities, and future possibilities.[? ? , 2]1 CCS Concepts: • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability. Additional Key Words and Phrases: datasets, neural networks, gaze detection, text tagging ACM Reference Format: Salauddin,Towsif, Tanzin-Ul-Islam Md., and Imran,Fardin Ahsan. . Network Security and Analysis of Crypography Mechanism: Case Study Method. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY. ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/1122445.1122456 1 INTRODUCTION The enlargement of network and information technology caused associations and individuals to join the internet. which results in a tremendous amount of data transmission over the network every day. If data in the network is hijacked by unauthorized persona it can bring harm to individuals and organizations. To restrict data plunder in network layer multiple network security techniques have been developed. Among them, cryptography is the most accepted method in the present world as the other conventional methods failed to provide information security in the network In general, cryptography is a process that hides data from unauthorized persons. It provides information security in the network by encrypting plain text which can be decrypted only by keys that are shared between the sender and receiver. So even if the data get stripped from the network, hacker or wicked user won’t be able to read the massage. There are two standards of cryptography one is symmetric cryptography and the other one is asymmetric cryptography. Both types of cryptography use a common key which is known as public key but asymmetric cryptography uses another special type of key which is known as the private key and unique for each user. Despite some drawbacks, cryptography provides confidentiality, integrity, non-repudiation and authentication facilities.[1][6] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © Association for Computing Machinery. Manuscript submitted to ACM 1
  • 2. 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 Woodstock ’18, June 03–05, 2018, Woodstock, NY 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 2 RESEARCH METHODOLOGY . 2.1 Research Objective Network security is one of the most concern topic in recent times because of vast usage of computer in every sector in our life. So securing these devices from any unauthorized users or activity to protect the data and information is very difficult task. But to secure these networks and devices cryptography is a most promising and rapidly growing technology which is very much trust worthy and rapidly deployed technology. The main objective of this paper is to analyze and identify the working mechanism of cryptography, its type symmetric and asymmetric cryptography, their limitations, cryptographic attacks and future of cryptography.[7] 2.2 Research Questions 2.2.1 What is the importance of network security in modern world? 2.2.2 What are the basic terminologies of cryptography? 2.2.3 How cryptography is more secure in contrast to other network security techniques? 2.2.4 what are the differences between symmetric cryptography and asymmetric cryptography? 2.2.5 what is the disadvantages of Cryptography? 2.3 Article Section 2.4 Keywords and Search String: It is the initial step of selecting articles after choosing the research domain and topic. Our topic is ‘Cryptography’ so we at first search with the keyword cryptography which resulted in showing a few articles on cryptography which was not covering the whole process of cryptography. After that, we search using strings like ‘network security: cryptography’, ‘literature review on cryptography’, ‘techniques of hiding information’, ‘research on cryptography’. From the search results, we collected our papers.[8] 2.5 Digital Libraries To Search: To attain relevant article, we searched on popular sites like ‘Google Scholar’, ‘Research Gate’, ‘Institute of Electrical and Electronics Engineers (IEEE)’, ‘Association for Computing Machinery (ACM)’. 2.6 Keyword Search and Manual Selection: With automated keyword search lots of articles were found and few of them didn’t match to our topic for this we have to manually select the papers which were specificly related to our topic. After selecting few articles we again shorted our list in oder to select only those articles which are more relevant to our topic. 2.7 Final Set of Articles: After manual selection we selected our final set of articles which we are going to use as reference. We used the final set of articles to carry out our research. 2
  • 3. 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 3 DISCUSSION: 3.1 What is the importance of network security in modern world? Ans:In this modern world the important aspect is network security over the internet. For protecting client data an efficient, stable, strong network security is needed. Network security also prevent the data from sabotage and hacker. It also protects any network consisting of huge number of pc from harmful spyware. It can make sure that the data which is shared is safe and secure.To ensure network security cryptography technique is used. Cryptography is a technique that ensures the data packet is secured or not hacked by unauthorized individuals from the network layer and data link layer.[4] 3.2 . What are the basic terminologies of cryptography? Ans: Although there are two types of cryptography most of the term are same for both types. To apply cryptography first we need a plain text. A plain text is a file that contains information that is going to be encrypted before transmitting. Encryption algorithm is another basic term in cryptography it is nothing but a mathematical process that converts plain text into cipher text. Plain text and encryption key is used as the input of the procedure. Cipher text is the encryption version of plain text which produced by encryption algorithm. Encryption key is the special that is given as input by the sender in encryption algorithm, whereas decryption key is the special key that is given input by the receiver as input in decryption algorithm. Decryption algorithm also in nothing but mathematical process that produces plain text from the cipher text. These are the basic terminologies of cryptography.[7] 3.3 How cryptography is more secure in contrast to other network security techniques? Ans: Cryptography encrypt data or plain text converting it into cipher text before transmitting the data over the network. The cipher text can only be decrypted at the receiver end. Even if the data gets intercepted from the network in can’t be modified or changed by the hacker or malicious individuals. Moreover, hackers can’t read the data because to decrypt the data it needs secret key which only known to the receiver. So, there is no chance of stealing data from network layer. Where firewall, access control, antivirus software, network segmentation etc. techniques only provides security in host computers but the network layers remain unsecure and data can be intercepted and modified in the network layer by the hackers, whereas cryptography ensures network layer safety. In addition, cryptography provides condentiality, integrity, non-repudiation, authentication which are the basic goals of secure network.[3] 3.4 what are the differences between symmetric cryptography and asymmetric cryptography? Ans: Symmetric cryptography and asymmetric cryptography both almost uses same mechanism to encrypt and decrypt data but asymmetric uses a pair of unique keys which is known as private key. For symmetric encryption and decryption of a plain text is done with similar key (public key). But asymmetric encryption and decryption of a plain text is done with similar public key and a pair of private keys which is dissimilar for every user. Although the public key remains same for both sender and receiver in asymmetric cryptography.[1] 3.5 what is the disadvantages of Cryptography? Ans: Though cryptography ensures data safety it has few drawbacks. It wastes time to encrypt and decrypt plain text. This process won’t a valid user to access data if user forgets his/her key. Cryptography is weak against brute force attack. Implementation of cryptography is costly. Moreover, it doesn’t protect against the vulnerabilities and threats 3
  • 4. 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 Woodstock ’18, June 03–05, 2018, Woodstock, NY 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 generated from poor system design. Encryption and decryption is nothing but mathematical process any mistake in mathematical term will result in system breakdown.[9] 4 FUTURE OF CRYPTOGRAPHY: To keep up with the modern needs in information cryptography is also evolving and enhancing. 4.1 Homomorphic encryption: Homomorphic encryption is a new ecryption technology. In this technology users are allowed to process data without decrypting it. With the help of homomorphic encryption encrypted data can be processed and encrypted result might be produced. 4.2 Hardware-based whole disk encryption: In this encryption technology after given a key the whole contents of a volume encrypts it after it is used. But this technology might fall against networks attacks via mail or websites .It only protect data if a laptop or a device is being stolen and it requires a key to decrypt such kind of data.[10] 4.3 Moving target defense: The most common problem faced by data security is not whether or not data is encrypted, it’s because of users use the same code as the attackers. In this kind of case moving target defense can be great helpful. The technique used in this process is that here the attack surface is constantly changed as a result attackers are not able to spend time reverse engineering user environment. 4.4 Block Chain: This technology is used to secure crypto-currencies like bit-coin and Ethereum. It can be used as a strong weapon against cyber threats. When block-chain technology is applied to cyber-security models, to increases target fungibility all the lights are turned on. This helps to prevent making fake identification. This technology might become a very powerful tool for IOT.[2] 4.5 Quantum cryptography For transmitting a secret key or password over a distance this is the only proven or verified method. To physically move a common file between two parties it uses photons of light. Concern is that this photons of light might be intercepted with each other but it is ensured that this data or information can’t be cloned or copied.[5] 5 VALIDITY THREAT: 5.1 Selection of Article: The articles were selected according to research related topic. The articles were searched by the keywords then among the various articles only the most relevant to our topic articles were selected manually by all the authors.[1] 4
  • 5. 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 Network Security and Analysis of Crypography Mechanism: Case Study Method Woodstock ’18, June 03–05, 2018, Woodstock, NY 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 5.2 Experimenter bias: All the researcher agreed upon the references that are being used for this paper. To avoid inadvertently conflicts between members all the researchers communicate with each other until the end of the research.[9] 5.3 Data Falsification: All the data used on this research paper are valid. Data provided in this paper are collected from the previous researches conducted on this topic and the reference of those paper are given correctly.[4] 6 CONCLUSION: In this modern era of technology everyone transfers information or data to others through technology. People like us transfer information or receive information with risk. For different reason we take the advantage of Internet when we emit data or get the data, but the main issue is that the data are transferred or received by people may be accessed by hacker or unauthorized user out there in cyberspace. So, data security should be the main thought to all Internet users. There needs digital keys and proper protection for the Cryptography to make sure that the data has been transferred to the receiver side is safe and secure. In that case Encryption decryption technique should be applied in such a way so that a professional hacker can’t get the information at any cost. We need to modify our information into hard-reading forms so that the information that transferred is secured and will get to the target safely. Nowadays, we are having the risk of security in data that’s why we need a tight security to secure us from the hacker and also improve the cryptography techniques or methods because the cyber criminals are becoming smarter day by day.[4] REFERENCES [1] Sattam S Al-Riyami and Kenneth G Paterson. [n.d.]. Certificateless public key cryptography. ([n. d.]). 146.https://ijcsmc.com/docs/papers/July2017/ V6I7201732.pdf [2] Antonio, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. [n.d.]. Device-independent security of quantum cryptography against collective attacks. ([n. d.]). [3] Dr. Pankaj Gupta Deepak Goyal Monika Goyal. Dr. Sandeep Tayal, Dr. Nipin Gupta. 2017.. A Review paper on Network Security and Cryptography. (2017.). [4] ennifer Rowley. [n.d.]. Using Case Studies in Research. ([n. d.]). [5] Sanjay Bhargava Kritika Acharya, Manisha Sajwan. [n.d.]. Analysis of Cryptographic Algorithms for Network Security. ([n. d.]). [6] Shyam Nandan Kumar. 2015. Review on Network Security and Cryptography. (2015). [7] SMohammad Tanveer Khan.2017. Review: Network Security Mechanisms and Cryptography. 2017.. Computer Science and Mobile Computing. (2017.). [8] William Stallings. [n.d.]. Cryptography and Network Security. ([n. d.]). [9] ANDROID TUTORIAL. [n.d.]. Importanceo fC ryptoдraphyi nI nf ormationS ecurity.([n. d.]). [10] John Viega, Matt Messier, and Pravir Chandra. [n.d.]. Network security with openSSL: cryptography for secure communications. ([n. d.]). A A CONTRIBUTION RECORD: A.1 A.1 Paper Assesment: A.2 A.2 Paper writing contribution: 5
  • 6. 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 Woodstock ’18, June 03–05, 2018, Woodstock, NY 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 Student id & name Paper No from Ref Paper Title 17-33837-1 Salauddin,Towsif [3],[6],[7],[8] A Review paper on Network Security and Cryp- tography, Review on Network Security and Cryptography,Review: Network Security Mech- anisms and Cryptography,Cryptography and Network Security Cryptography 17-33958-1 Tanzin-Ul-Islam Md. [1],[2],[4],[9] Certificateless public key cryptography, Device- independent security of quantum cryptog- raphy against collective attacks,sing Case Studies in Research,sing Case Studies in Re- search,Cryptography and network security 17-33846-1 Imran,Fardin Ahsan [5],[10] Analysis of Cryptographic Algorithms for Net- work Security,Network security with openSSL: cryptography for secure communications. Table 1. Paper collected and read by the group member Student id & name Section No Section Title 17-33837-1 Salauddin,Towsif 1,2.2.3,2.2.4,2.3.1, 2.3.2,3.3,3.4,5.1, 4.4,4.5 Abstract,Introduction,Keyword and search string,Digital libraries to search, How cryp- tography is more secure in contrast to other network security techniques?,what are the differences between symmetric cryptography and asymmetric cryptography?,Selection of articles,Block Chain, Quantum cryptography 17-33958-1 Tanzin-Ul-Islam Md. 2.1,2.2.2,2.2.5,5.2, 4.1,4.2 Research Objective, What are the basic termi- nologies of cryptography?what is the disad- vantages of Cryptography? Keyword Search and Manual Selection,Final Set of Articles, Experimenter bias, Homomorphic encryption, Hardware-based whole disk encryption 17-33846-1 Imran,Fardin Ahsan 5.3,6,3.1,2.2.1 Data falsification.conclusion, What is the im- portance of network security in modern world? Table 2. Section(s) Written in the paper by the group member 6