Review On Network Security and Cryptogra
Review On Network Security and Cryptogra
Review On Network Security and Cryptogra
Abstract— In these days communication technology is very advanced. Digital communication has become very
important to secure transmission of information between the sender and the receiver. Security for exchange is a very
important feature because it protects information from interloper. In this paper we present a hierarchy of network
security technologies such as privacy, authentication, non-rejection and honesty control. There are two popular
security mechanisms, namely cryptography and steganography. Both are well known and widely used techniques.
Cryptography is used to send data in an encrypted form using the encryption key. Encrypted data is transmitted
through unsafe public media. Decryption algorithms are also used to decrypt messages when using decryption keys.
Steganography is used to hide data in other cover media.
I. INTRODUCTION
The transmission of information via the Internet may include sensitive personal data that may be attacked by
intruders. In addition, there are many applications on the Internet and many websites require the user to fill out the form
in which sensitive personal data can be used. The user may need personal and secure communication for a number of
reasons, which protect his information from intruders who are still waiting for an attack on sensitive data. Therefore,
confidentiality and data integrity are necessary to protect information from unauthorized access and use. Network
security issues can be divided into four parts: confidentiality, authentication, rejection, and integrity checking.
Confidentiality or confidentiality concerns the protection of information against unauthorized users. This means that
unauthorized users should not be able to read and understand the information. Verification means that any party that may
be a sender or receiver can verify that the other party is what he claims, that is, validates the identity of the other party.
Indemnification means that the sender can not refuse to send a particular message. That is, if there is a transaction
between the two parties, the non-refusal service can prove that it has done the transaction for one of the parties, and not
another person. Integrity means that the recipient can confirm that a message has not been modified during the
transmission, that is, to store information about forgery.
B. Authentication
It means verification. Verification means the identification process of a person based on the user name and
password. In security systems, authentication is the process by which people access items based on their identity.
Authentication ensures that the person he claims but does not say anything about the person's right
C. Non-repudation
Non-repudiation is a guarantee that someone can not deny something. Generally, profanity refers to the ability
to ensure that this message or message from the sender is not communicated.
III. CRYPTOGRAPHY
Cryptography is a technology that ensures security by preventing messages from being encrypted and readable.
Cryptography is a technology to transmit data on the Internet by applying an encryption algorithm that intruders are
difficult to attack specific confidential information or personal information. The two basic words used in encryption are
encryption and decryption. The encryption process is the process of converting plain text to encrypted text, and the
decryption process is the reverse process of encryption. Plain text is text that contains the original message or
unencrypted data and the cipher text is text that can be shared after encrypting the message. A key is necessary for
encrypting and decrypting messages.
1. Plain Text
Unscrambled information to be sent. This may be confidential information such as simple text documents, credit
card numbers, passwords, bank account numbers, or personnel information, or secret expressions communicated between
organizations.
A. Cryptographic Algorithm
An expression used to encrypt plain text to generate code text. Converting readable text to encrypted text using
cryptographic algorithms is called coding, and converting encrypted text to readable text with the same cryptographic
algorithm is called decryption. Figure 1 shows the cryptographic tactics. Widely cryptographic algorithms can be divided
into two categories:
Stream algorithms : Clear byte operation at once. Bytes can be letters, numbers or special characters. This
process is inefficient and slow.
Block algorithms : Works on the readable text in blocks of bytes, called blocks (hence block name algorithm or
block numbers). The general block size for modern algorithms is 64 bytes, small enough to work with but large enough
to prevent code breakers. Unfortunately, breaking the 64-byte algorithm with brute force is unfortunately a relatively
simple task with the current microprocessor speed.
1. Types of Cryptography
a. Secret Key Cryptography(Private key Cryptography): This algorithm is also known as secret key cryptography,
where the sender and receiver encode and decode messages using the same key. An algorithm known as symmetric
key algorithm is used for symmetric key encryption. Symmetric algorithms are classified into two types: stream
encryption and block encryption. The flow encryption algorithm is optimized to accept readable text streams used to
create encryption keys and to encode text streams. The block number algorithm works on data blocks where readable
text is divided into blocks and each block is used independently.
Some algorithms are:
• Data Encryption Standard(DES)
• Advanced Encryption Standard(AES)
• Triple Data Encryption Standard
• International Data Encryption Algorithm
• Blowfish Encryption Algorithm
• Twofish Encryption Alggorithm
b. Public-Key Cryptography: In the public's cryptography, each user generates two keys: a public key that is used to
encrypt messages sent to the user, and the user needs a private key to decrypt a message.
Some algorithms are:
• Diffie-Hellman
• Rivest –Shamir-Adleman(RSA)
• Digital Signature Algorithm(DSA)
Disadvantages:
• In this code takes a long time.
• It takes a long time to understand the code.
• If you want to send a code to another person in the past, it will cost a lot to meet.
B. Steganography
Steganography is a technology for embedding hidden messages or data so that the existence of messages can
not be discovered. It is the advanced technology of cryptography. The main purpose of steganography is to hide the
message or secret information so that no one can detect it. If they receive doubt data, the target is lost The various types
of data can be audio, video, text and images etc.
1. The Carrier image:The image of the courier is also called the cover object that will carry the message / data
that used to be hidden.
2. The Message:There may be anything like a message data, file or image etc.
3. The Key: A key is used to decode and understand the hidden message.
Disadvantages:
• If this technique has fallen into the wrong hands like hackers, terrorists and criminals, then it can be very
dangerous for everyone.
• A large number of data, huge file sizes, so anyone can doubt for all.
IV. CONCLUSIONS
In this paper, we introduce the scope / hierarchy of network security technology. Due to the growing demands
for privacy and security, various data concealment technologies are required, and many integration and extraction
techniques are being developed. We discussed all cryptographic techniques and steganography techniques. Both are well-
known and widely used technologies. The secret is a very convenient and safe technique for communication. When both
techniques are combined, the use of cryptography and steganography makes communication more secure.