亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Role of Cryptography in Network Security

计算机科学 计算机安全 密码学 加密 公钥密码术 网络安全 认证(法律) 计算机网络
作者
Ajanta De Sarkar,Swagata Roy Chatterjee,Mohuya Chakraborty
出处
期刊:Lecture notes in networks and systems 卷期号:: 103-143 被引量:7
标识
DOI:10.1007/978-981-15-9317-8_5
摘要

Network administrators employ several security mechanisms to protect data in the network from unauthorized access and various threats. The security mechanisms enhance the usability and integrity of the network. The design aspects of the network security mechanism involve both hardware and software technologies. The application domains of security mechanisms cover both public and private computer networks which are used in everyday jobs for conducting transactions and communications among business partners, government agencies, enterprises and individuals. The network security schemes vary depending on the types of the network, that is, public or private, wired or wireless. Data security includes encryption, tokenization, and key management practices in protecting data across all applications and platforms. The antivirus and antimalware software are also part of network security for protection from malware such as spyware, ransomware, trojans, worms, and viruses. Cryptography is an automated mathematical tool that plays a vital role in network security. It assures the confidentiality and integrity of data as well as provides authentication and non-repudiation to the users. This chapter primarily focuses on cryptography techniques and their role in preserving the network security. The cryptography technique consists of encryption and decryption algorithms. The encryption algorithms perform scrambling of ordinary text and generate an unreadable format for the third party known as ciphertext. The original data is restructured by the intended receiver using decryption algorithms. The cryptographic techniques are broadly classified into three categories namely symmetric-key cryptography, asymmetric-key cryptography and authentication. The cryptographic algorithms that are widely accepted are outlined with their relative advantages and disadvantages. Moreover, recent proficient cryptographic algorithms specific to cloud computing, wireless sensor networks and on-chip-networks are thoroughly discussed that provide a clear view about acquiring secure communication in the network using cryptography.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
10秒前
辉哥发布了新的文献求助10
15秒前
28秒前
35秒前
36秒前
xny发布了新的文献求助10
41秒前
xiw完成签到,获得积分10
43秒前
bagman完成签到,获得积分20
1分钟前
1分钟前
XZY发布了新的文献求助20
2分钟前
慕青应助诚心的书雪采纳,获得10
2分钟前
万能图书馆应助xny采纳,获得10
2分钟前
棠臻完成签到 ,获得积分10
3分钟前
3分钟前
Lucas应助新雨采纳,获得10
3分钟前
3分钟前
3分钟前
大梨发布了新的文献求助10
3分钟前
3分钟前
3分钟前
3分钟前
英姑应助科研通管家采纳,获得10
3分钟前
YoKo发布了新的文献求助30
3分钟前
4分钟前
海洋完成签到 ,获得积分10
4分钟前
4分钟前
xny发布了新的文献求助10
4分钟前
4分钟前
YoKo发布了新的文献求助10
4分钟前
乔Q发布了新的文献求助10
4分钟前
大梨完成签到 ,获得积分10
4分钟前
YoKo完成签到,获得积分10
4分钟前
CodeCraft应助xny采纳,获得10
4分钟前
科目三应助mmyhn采纳,获得10
4分钟前
ratamatahara完成签到,获得积分10
5分钟前
Sandy发布了新的文献求助10
5分钟前
祁笑言发布了新的文献求助20
5分钟前
5分钟前
5分钟前
乔Q完成签到,获得积分10
6分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Les Mantodea de Guyane Insecta, Polyneoptera 2000
The Organometallic Chemistry of the Transition Metals 800
Leading Academic-Practice Partnerships in Nursing and Healthcare: A Paradigm for Change 800
Signals, Systems, and Signal Processing 610
The formation of Australian attitudes towards China, 1918-1941 600
Research Methods for Business: A Skill Building Approach, 9th Edition 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6418720
求助须知:如何正确求助?哪些是违规求助? 8238304
关于积分的说明 17501868
捐赠科研通 5471579
什么是DOI,文献DOI怎么找? 2890704
邀请新用户注册赠送积分活动 1867523
关于科研通互助平台的介绍 1704499