Review on Encryption Ciphers of Cryptography in Network Security

نویسندگان

  • Gunjan Gupta
  • Rama Chawla
چکیده

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential intrusions and attacks. Security of data can be done by a technique called cryptography. So one can say that cryptography is an emerging technology, which is important for network security. This paper covers the various cipher generation algorithms of cryptography which are helpful in network security. Keywords—Plain Text, Cipher Text, Attacks, Cryptography, AES, DES

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance

This work focuses an alternative direction of cryptography, based on Data Dependent Rotations (DDR). This methodology gives many promises for secure communication networks of the next years. DDR transformations have attracted the interest of researchers, and a great number of new ciphers have been developed. These encryption algorithms are intended to be used in all the applications of present ...

متن کامل

A Review on Various Data Security Techniques in Wireless Communication System

The data transfer, either through wired media or wireless media, needs privacy or a security. In case of wireless means of communication when the data is in the route, in order to protect the data from going into the hands of an unauthorized person, the two main techniques are used i.e. Steganography and Cryptography. Steganography hides the messages inside other harmless digital media without ...

متن کامل

Zigzag Ciphers: A Novel Transposition Method

The requirement of information security has undergone changes in the last several decades. Network security measures are needed to protect data during their transmission. Cryptography is probably the most important aspect of communications security and is becoming increasingly important as a basic building block for computer security. This paper sets out to develop a hybrid way of encryption of...

متن کامل

Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography

In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...

متن کامل

Gmdes: a Graph Based Modified Data Encryption Standard Algorithm with Enhanced Security

Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today’s internet and network applications. Thus, design of a secure encryption algorithm is very necessary which can protect the unauthorized attacks. An encryption algorithm is computationally secure if it cannot be intruded...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012