Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security and Cryptography Techniques

N. Valarmathy, P. Vishnupriya

Abstract


The computer network technology is developing rapidly, and the development of internet technology is more speedily, people more aware of the significance of the network security. Network security is main issue of computing because many types of attacks are increase day by day. The wicked nodes create a problem in the network. This spiteful nodes acts as selfishness, It can use the funds of other nodes and preserve the resources of its own. After analyzing and quantifying the network in rank security elements confidentiality, reliability and convenience, this paper describes the network security secrecy vector, network safety integrity vector and network security availability vector; also we close at hand some major type of attacks in MANET.


Keywords


Symmetric Encryption, A Symmetric Encryption, Hash Algorithm, Caesar Table, Cryptography.

Full Text:

PDF

References


Atul Kahate “Cryptography and Network Security”, Tata McGraw-Hill Companies, 2008

D. Boneh and M. Franklin, “Identity-based encryption form the well pairing”, in Advance in Cryptology (CRYPTO’01), LNCS 2139, Springer Verlag, 37, 213-229, 2011

Davis.R, “The Data Encryption Standard in Perspective”, Proceeding of Communication Society magazine, IEEE, Vol 16, Nov1978.

Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha “Performance Evaluation of Symmetric Cryptographic Algorithms”, International Journal of Electronics and Communication Technology Vol 2 Issue 3, Sep 2011.

Pratap Chandra Mandal “Superiority of Blowfish Algorithm”, International Journal of Advanced Research in Computers Science and Software Engineering Vol 2 Issue 9, Sep 2012.

Daemen.J and Rijmen, The Advanced Encryption Standard, Dr. Dobb’s Journal, March 2001.

R.L.Rivest, A.Shamir, L.Adlem an, “A Method for obtaining Digital Signatures and Public-Key Cryptosystem”, Communication of the ACM, Vol 21, Feb 1978.

E.Thmbiraja, G.Ramesh, Dr.R.Umarani, “A survey on various most common encryption techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012.

Monika Agrawal, Pradeep Mishra”, A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol.4 May 2012.

D. Crocker, T. Hansen, and M. Kucherawy, Domain keys Identified Mail (DKIM) Signatures, Technical Report 6376, Sep 2011.

D. Eastlake, Domain Name System Security Extensions, Technical Report RFC 2535, Mar 1990.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.