0% found this document useful (0 votes)
34 views

Network Security With Cryptography: International Journal of Scientific Research January 2018

This document summarizes a research article about network security with cryptography. It discusses using cryptography techniques like encryption, hashing functions, and key exchange to secure network communication channels and keys. Specifically, it proposes two methods: 1) Using encryption to secure the communication channel and ensure authenticity between communicating parties. 2) Using techniques like hybrid encryption and double encryption to securely transmit the encryption key between sender and receiver. The goal is to protect private data from attackers by increasing the complexity of cracking the encryption key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Network Security With Cryptography: International Journal of Scientific Research January 2018

This document summarizes a research article about network security with cryptography. It discusses using cryptography techniques like encryption, hashing functions, and key exchange to secure network communication channels and keys. Specifically, it proposes two methods: 1) Using encryption to secure the communication channel and ensure authenticity between communicating parties. 2) Using techniques like hybrid encryption and double encryption to securely transmit the encryption key between sender and receiver. The goal is to protect private data from attackers by increasing the complexity of cracking the encryption key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327417301

Network Security with Cryptography

Article  in  International Journal of Scientific Research · January 2018

CITATIONS READS

4 1,393

3 authors, including:

Kundalakesi Mathivanan
Sri Krishna College of Arts and Science
11 PUBLICATIONS   14 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Testing and Anti Random Testing View project

All content following this page was uploaded by Kundalakesi Mathivanan on 04 September 2018.

The user has requested enhancement of the downloaded file.


IJSRD - International Journal for Scientific Research & Development| Vol. 6, Issue 01, 2018 | ISSN (online): 2321-0613

Network Security with Cryptography


Mrs. M.Kundalakesi1 Mr. DevaPrakash. A2 Mr. Azath. A3
1
Assistant Professor 2,3M.Sc. Software Systems
1,2,3
Department of B.C.A and Software Systems
1,2,3
Sri Krishna Arts and Science College, India
Abstract— Powerless way from claiming majority of the data
B. Freshness
against imminent dangers need get a ponderous undertaking
to those experts about this field. It is an aftereffect of the A percentage technique may be necessary to foil recharge
normal also enduring battle toward the carrying people that strike. Particular case such measure is including over each
need processed different methodologies which shields crucial message a timestamp substantial just for, say, 10 seconds.
data starting with speculated security strike. For the regular Those recipient camwood after that simply keep messages
clients who need aid new of these possibility incursion(s) will around to 10 seconds, will look at recently landed messages
their personal information, feel defenseless when they will past ones on channel out duplicates. Messages more
experience persecutor(s) who wish to misuse the secrecy seasoned over 10 seconds camwood a chance to be tossed out,
from claiming this natural data. Here we bring examined over since whatever replays sent more than 10 seconds later will a
a unique approach which manage these approaching strike. chance to be dismisses as excessively awful of age.
We have attempted to prepare an algorithm which will shield
clients against shocking Attack of saved majority of the data. III. METHODS
We have consolidated a set for different systems to process a A. Secure Channel
calculation which is safe will these incursions. These
techniques insert recognitions similar to mixture In this technique we gatherings give security of the
cryptography. R.S.A. algorithm, Key management, Hash correspondence channel (provided the magic that is used to
functions or Encrypted key exchange. scramble those information remains same) Furthermore
Key words: Network Security, Cryptography shield those correspondence channel starting with at whatever
invasions that might happen on the channel. Our primary
intention in this system may be with shield the
I. INTRODUCTION
correspondence channel as opposed the magic display for the
Private key encryption otherwise called symmetric enter encryption and unscrambling procedure. This system will be
encryption may be beyond question the more rudimentary resolved to prevent the correspondence channel starting with
encryption What's more henceforth viewed Furthermore At whatever outside strike which Might bargain the encrypted
known should make uncomplicated over usage. However, majority of the data continuously exchanged from sender
this uncomplicated way of private way encryption makes it should recipient. To actualize all the these efforts to establish
delicate against these possibility incursions produced to harm safety we might utilization Different systems or calculations.
those secrecy of this personal majority of the data. To our Those the vast majority prominently referred to system is
paper “Protection about enter in private key Cryptography” with present exactly character code which will guarantee the
[1] we manage the vitality for cryptography Furthermore sender that those individual who is on collector conclusion is
dives with every last bit security issues and additionally a commissioned persnickety. This technique might be fruitful
should move forward the pillars i.e. Encryption for plain text and might guarantee those authenticity for close discussion
and Unscrambling of content Toward presenting another continuously conveyed looking into between the two
device around that might be called as mixture way conveying gatherings. This code is accessible on both those
cryptography. Other than this we figure out the reason conveying gatherings What's more permit each from claiming
security is needed what's more entryway it is extending step them will produce a dependable method for verification.
by step Also the reason insurance of data may be obliged and
also how a secure channel for correspondence will be a B. Secure Key
indispensable prerequisite for cryptography so as to attain In this strategy we give acceptable security to enter that is
safe Furthermore secure correspondence. Therefore, we have used to scramble those information (provided those channel
attempted with enhance the correspondence channel done that is used to exchange the magic remains same) What's
which we bring acquainted two strategies to securing the more shield those correspondence channel from any
private key which will be send Eventually Tom's perusing invasions that might happen on the channel. This technique
sender should collector. concentrates for safeguarding the way which is the A large
portion paramount component in the cryptography
II. CRYPTOGRAPHIC PRINCIPLES methodology. We might attempt to utilize ‘Hybrid
Encryption’ and ‘Double Encryption’ idea to guarantee that
A. Redundancy those fact that secure from persecutors who attempt will
The to start with guideline will be that every last bit encrypted attack private data toward retrieving those enter. It may be a
messages must hold numerous a portion redundancy, that is, prestigious reality that a powerless magic bogs down Indeed
majority of the data not necessary on see all the those those strongest of the calculations with the goal here we
message. Messages must hold a percentage excess. might attempt with secure the practically critical component
in the transform for cryptography i.e - the magic. With
perform this technique there need aid a lot of people amount

All rights reserved by www.ijsrd.com 1028


Network Security with Cryptography
(IJSRD/Vol. 6/Issue 01/2018/277)

of prevailing calculations accessible. Each of these algorithm us against them gets to be fundamental particularly At all that
permits us will furnish extensive variety for security of the will be voyaging those advanced way. Incitement from
magic in play. Each calculation need its own reductions and claiming new strategies is not mandatory Likewise we
additionally drawbacks furthermore gives an certain worth of camwood additionally embrace from those endeavors of
the magic. Those principle keep tabs of these techniques lies experts in this field. We have attempted with rebuild and
on the observation that with the increment in the change those contemporary systems over contriving those
unpredictability of the key it gets An. Challenge to the algorithm which will move forward the correspondence and
invaders to split those way. These techniques likewise give a shield close majority of the data.
exceptional stage for future meets expectations that might be
completed around this observation. REFERENCE
[1] NehaTyagi, AshishAgarwal, AnuragKatiyar,
ShubhamGarg, ShudhanshuYadav, “Protection of Key in
Private Key Cryptography” published by “International
Journal of Advanced Research”, Volume 5, Issue 2, Feb
2017.
[2] ArpitAgrawal, GunjanPatankar,”Design of Hybrid
Cryptography Algorithm for Secure Communication”
published by “International Research Journal of
Fig. 1: SECURE CHANNEL Engineering and Technology”, Volume 3 Issue 1, Jan
2016.
[3] Meenakshi Shankar, Akshay.P, “Hybrid Cryptographic
Techniques Using RSA Algorithm and Scheduling
Concepts” published by “International Journal of
Network Security & Its Application”, Volume 6, Issue 6,
Nov 2014.

IV. FURTHER DISCUSSION


The system utilized inculcates those contemporary ideas from
claiming mixture cryptography for a prominent encryption
procedure r. Encountered with urban decay because of
deindustrialization, engineering imagined, government
lodgin. A. Calculation. The space furthermore time
complexities assumes respectable part in achievement for any
code. Expanding the unpredictability considerably
increments those security about data Anyway on the distant
side usage from claiming code massively relies on the
cryptosystems in play. With the end goal the technique on be
popular, we additionally must think as of the abilities for
frameworks which are setting off should play of the system.
The greater part things considered, these two routines bring
a. Possibility to ensure private points and practically
absolutely make An stage for which further fill in camwood
a chance to be executed. Those system in itself control us a
degree should fill in on Concerning illustration those current
schema will face tests with the long haul Also constant
exertions starting with our side will be made with make it a
standout amongst the majority significant insurance systems
What's more almost invulnerable.

V. CONCLUSION
Cryptography field is managing a consistent surge from
claiming new Also development strike which strengths this
field will make to a uniform state for advancement. Admitting
of the finding about these far reaching strike for colossal
magnitudes, introduction about strategies which might shield

All rights reserved by www.ijsrd.com 1029

View publication stats

You might also like