Role of Cryptography in Network Security

计算机科学 计算机安全 密码学 加密 公钥密码术 网络安全 认证(法律) 计算机网络
作者
Ajanta De Sarkar,Swagata Roy Chatterjee,Mohuya Chakraborty
出处
期刊:Lecture notes in networks and systems 卷期号:: 103-143 被引量:7
标识
DOI:10.1007/978-981-15-9317-8_5
摘要

Network administrators employ several security mechanisms to protect data in the network from unauthorized access and various threats. The security mechanisms enhance the usability and integrity of the network. The design aspects of the network security mechanism involve both hardware and software technologies. The application domains of security mechanisms cover both public and private computer networks which are used in everyday jobs for conducting transactions and communications among business partners, government agencies, enterprises and individuals. The network security schemes vary depending on the types of the network, that is, public or private, wired or wireless. Data security includes encryption, tokenization, and key management practices in protecting data across all applications and platforms. The antivirus and antimalware software are also part of network security for protection from malware such as spyware, ransomware, trojans, worms, and viruses. Cryptography is an automated mathematical tool that plays a vital role in network security. It assures the confidentiality and integrity of data as well as provides authentication and non-repudiation to the users. This chapter primarily focuses on cryptography techniques and their role in preserving the network security. The cryptography technique consists of encryption and decryption algorithms. The encryption algorithms perform scrambling of ordinary text and generate an unreadable format for the third party known as ciphertext. The original data is restructured by the intended receiver using decryption algorithms. The cryptographic techniques are broadly classified into three categories namely symmetric-key cryptography, asymmetric-key cryptography and authentication. The cryptographic algorithms that are widely accepted are outlined with their relative advantages and disadvantages. Moreover, recent proficient cryptographic algorithms specific to cloud computing, wireless sensor networks and on-chip-networks are thoroughly discussed that provide a clear view about acquiring secure communication in the network using cryptography.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
运医小刀完成签到 ,获得积分10
2秒前
foyefeng完成签到,获得积分10
2秒前
3秒前
4秒前
懵懂的书蝶完成签到,获得积分20
7秒前
椰奶发布了新的文献求助10
8秒前
ning发布了新的文献求助10
11秒前
kinder完成签到,获得积分20
15秒前
苏素完成签到,获得积分10
15秒前
琦琦完成签到 ,获得积分10
16秒前
脑洞疼应助ZXMHmio采纳,获得10
16秒前
17秒前
18秒前
21秒前
宁钊发布了新的文献求助10
21秒前
淡淡的元霜完成签到,获得积分10
22秒前
swordshine完成签到,获得积分10
22秒前
luxiang发布了新的文献求助10
23秒前
monkeydjwei发布了新的文献求助10
26秒前
27秒前
大仙生完成签到,获得积分20
28秒前
30秒前
Lulu完成签到,获得积分10
31秒前
笨鸟一直飞完成签到,获得积分10
33秒前
大仙生发布了新的文献求助10
34秒前
AUGKING27完成签到 ,获得积分10
38秒前
王QQ完成签到 ,获得积分10
43秒前
45秒前
深情安青应助小殷同学采纳,获得10
47秒前
47秒前
48秒前
小岳同学完成签到,获得积分10
50秒前
徐杨她爹发布了新的文献求助10
51秒前
椰奶完成签到,获得积分10
53秒前
小岳同学发布了新的文献求助10
53秒前
ZYH完成签到,获得积分10
59秒前
充电宝应助徐杨她爹采纳,获得10
1分钟前
1分钟前
小菠萝完成签到,获得积分10
1分钟前
AAA完成签到 ,获得积分10
1分钟前
高分求助中
Sustainable Land Management: Strategies to Cope with the Marginalisation of Agriculture 1000
Corrosion and Oxygen Control 600
Python Programming for Linguistics and Digital Humanities: Applications for Text-Focused Fields 500
Heterocyclic Stilbene and Bibenzyl Derivatives in Liverworts: Distribution, Structures, Total Synthesis and Biological Activity 500
重庆市新能源汽车产业大数据招商指南(两链两图两池两库两平台两清单两报告) 400
Division and square root. Digit-recurrence algorithms and implementations 400
行動データの計算論モデリング 強化学習モデルを例として 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 有机化学 工程类 生物化学 纳米技术 物理 内科学 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 电极 光电子学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 2547452
求助须知:如何正确求助?哪些是违规求助? 2176252
关于积分的说明 5603165
捐赠科研通 1897045
什么是DOI,文献DOI怎么找? 946545
版权声明 565383
科研通“疑难数据库(出版商)”最低求助积分说明 503793