Role of Cryptography in Network Security

计算机科学 计算机安全 密码学 加密 公钥密码术 网络安全 认证(法律) 计算机网络
作者
Ajanta De Sarkar,Swagata Roy Chatterjee,Mohuya Chakraborty
出处
期刊:Lecture notes in networks and systems 卷期号:: 103-143 被引量:7
标识
DOI:10.1007/978-981-15-9317-8_5
摘要

Network administrators employ several security mechanisms to protect data in the network from unauthorized access and various threats. The security mechanisms enhance the usability and integrity of the network. The design aspects of the network security mechanism involve both hardware and software technologies. The application domains of security mechanisms cover both public and private computer networks which are used in everyday jobs for conducting transactions and communications among business partners, government agencies, enterprises and individuals. The network security schemes vary depending on the types of the network, that is, public or private, wired or wireless. Data security includes encryption, tokenization, and key management practices in protecting data across all applications and platforms. The antivirus and antimalware software are also part of network security for protection from malware such as spyware, ransomware, trojans, worms, and viruses. Cryptography is an automated mathematical tool that plays a vital role in network security. It assures the confidentiality and integrity of data as well as provides authentication and non-repudiation to the users. This chapter primarily focuses on cryptography techniques and their role in preserving the network security. The cryptography technique consists of encryption and decryption algorithms. The encryption algorithms perform scrambling of ordinary text and generate an unreadable format for the third party known as ciphertext. The original data is restructured by the intended receiver using decryption algorithms. The cryptographic techniques are broadly classified into three categories namely symmetric-key cryptography, asymmetric-key cryptography and authentication. The cryptographic algorithms that are widely accepted are outlined with their relative advantages and disadvantages. Moreover, recent proficient cryptographic algorithms specific to cloud computing, wireless sensor networks and on-chip-networks are thoroughly discussed that provide a clear view about acquiring secure communication in the network using cryptography.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
刚刚
1秒前
舜瞬应助失眠小小采纳,获得10
1秒前
xff发布了新的文献求助10
1秒前
1秒前
1秒前
星辰大海应助晓芳采纳,获得10
2秒前
李健的小迷弟应助123采纳,获得10
3秒前
淡淡的沅完成签到,获得积分10
3秒前
HY981025完成签到,获得积分10
3秒前
4秒前
科研通AI2S应助夕闻道采纳,获得30
4秒前
笨笨山芙完成签到 ,获得积分0
5秒前
5秒前
lasak完成签到,获得积分10
5秒前
zxf发布了新的文献求助10
5秒前
6秒前
路路发布了新的文献求助10
6秒前
ZZQ发布了新的文献求助20
6秒前
Hello应助淡淡的沅采纳,获得10
7秒前
科研通AI6.3应助喜喜采纳,获得10
8秒前
梦的光点完成签到,获得积分10
9秒前
Fancy完成签到,获得积分10
9秒前
duanyimeng发布了新的文献求助10
10秒前
yy发布了新的文献求助10
10秒前
科目三应助hsx采纳,获得10
10秒前
洁净的绿柳完成签到,获得积分10
11秒前
molihuakai应助靓丽迎梦采纳,获得10
11秒前
刘雯完成签到,获得积分10
13秒前
Wdmsny发布了新的文献求助10
14秒前
14秒前
所所应助落后的之槐采纳,获得10
15秒前
万能图书馆应助JC采纳,获得10
15秒前
晓畅发布了新的文献求助20
16秒前
传奇3应助pathway采纳,获得10
17秒前
17秒前
陈乔驳回了思源应助
17秒前
zhangzi完成签到,获得积分10
19秒前
香蕉觅云应助AWYF采纳,获得10
19秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Les Mantodea de Guyane Insecta, Polyneoptera 2000
Leading Academic-Practice Partnerships in Nursing and Healthcare: A Paradigm for Change 800
Signals, Systems, and Signal Processing 610
Research Methods for Business: A Skill Building Approach, 9th Edition 500
Research Methods for Applied Linguistics 500
Picture Books with Same-sex Parented Families Unintentional Censorship 444
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6414952
求助须知:如何正确求助?哪些是违规求助? 8233838
关于积分的说明 17483892
捐赠科研通 5467816
什么是DOI,文献DOI怎么找? 2888881
邀请新用户注册赠送积分活动 1865819
关于科研通互助平台的介绍 1703435