Importance of Cryptography in Network Security

被引:6
|
作者
Devi, Rajani T.
机构
关键词
promiscuous; repudiation; paranoid; hieroglyphs; malicious; intruder;
D O I
10.1109/CSNT.2013.102
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
the main aim of this paper is to provide a broad review of network security and cryptography, with particular regard to digital signatures. Network security and cryptography is a subject too wide ranging to coverage about how to protect information in digital form and to provide security services. However, a general overview of network security and cryptography is provided and various algorithms are discussed. A detailed review of the subject of network security and cryptography in digital signatures is then presented. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical and versatile techniques available. Fiat-Shamir signature schemes, DSA and related signature schemes are two other methods reviewed. Digital signatures have many applications in information security, including authentication, data integrity, and non-repudiation was reviewed.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [1] Network Security Using Biometric and Cryptography
    Dutta, Sandip
    Kar, Avijit
    Mahanti, N. C.
    Chatterji, B. N.
    [J]. ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, PROCEEDINGS, 2008, 5259 : 38 - 44
  • [2] Cryptography and Network Security: Principles and Practice
    Sklavos, Nicolas
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 49 - 50
  • [3] Cryptography & Security implementation in Network Computing Environments
    Pandey, Rajanikant
    Pandey, Vinay Kumar
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3136 - 3140
  • [4] NETWORK SECURITY USING LATTICE BASED CRYPTOGRAPHY
    Singhla, Sonal
    Yadav, Shailja
    Tanwar, Rohit
    [J]. IIOAB JOURNAL, 2019, 10 (02) : 66 - 71
  • [5] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [6] A novel cryptography for ad hoc network security
    Pi Jian-yong
    Liu Xin-song
    Wu Ai
    Liu Dan
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1448 - +
  • [7] Cryptography for Network Security Failures, Successes and Challenges
    Preneel, Bart
    [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 36 - 54
  • [8] Quantum Cryptography and Chaos Functions: The Ultimate for Network Security
    Kartalopoulos, Stamatios
    [J]. RECENT ADVANCES IN ENGINEERING EDUCATION, 2009, : 14 - 14
  • [9] A symmetric cryptography algorithm in wireless sensor network security
    Li J.
    [J]. Li, Juan (lijuan@hgzyxy.com.cn), 1600, Kassel University Press GmbH (13): : 102 - 110
  • [10] New media for teaching applied cryptography and network security
    Hu, Ji
    Cordel, Dirk
    Meinel, Christoph
    [J]. INNOVATIVE APPROACHES FOR LEARNING AND KNOWLEDGE SHARING, PROCEEDINGS, 2006, 4227 : 488 - 493