The Literature Review on The Role and Significance of Cryptography for Network Security in Current Scenario

Author:

Ranjay Praful Kr.1,Prasad Ramdip2,Sattar Arif Md.3

Affiliation:

1. Department of Computer Science, Magadh University, Bodh Gaya, India

2. Department of Mathematics, Danapur College, Patna, India

3. Department of Computer Science, Anugrah Memorial College, Gaya, India

Abstract

As the internet has gotten more integrated into our daily lives and has grown exponentially over the last several decades, data security has become a major issue for everybody connected to the internet. Data security ensures that only the intended recipients have access to our information and prohibits any data modification or manipulation. Various techniques and approaches have been developed to reach this level of security. Cryptography is described as a set of techniques for encrypting data using specified algorithms that render the data unreadable to the naked eye unless decoded using procedures predefined by the sender. We cover some of the most recent research in the fields of cryptography and network security in this article. The security vulnerabilities of existing as well as upcoming technologies in the field of Computer Networks are discussed in these research articles. We bundle the articles together based on their content and categorise the research subjects based on their implementation throughout the seven layers of the well-known OSI reference model. In the interest of brevity, the main purpose for each research study is outlined, and the proposed solution is stated simply.

Publisher

Technoscience Academy

Subject

General Medicine

Reference41 articles.

1. S. J. Lincke and A. Hollan, "Network Security: Focus on Security, Skills, and Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee, 2007.

2. O. O. Khalifa, M. R. Islam, S. Khan and M. S. Shebani, "Communications cryptography," in RF and Microwave Conference, 2004. RFM 2004. Proceedings, Selangor, 2004.

3. N. Jirwan, A. Singh and S. Vijay , "Review and Analysis of Cryptography Techniques," International Journal of Scientific & Engineering Research, vol. 3, no. 4, pp. 1-6, 2013 .

4. Tayal, N. Gupta, P. Gupta, D. Goyal and M. Goyal, "A Review paper on Network Security and Cryptography," Advances in Computational Sciences and Technology , vol. 10, no. 5, pp. 763770, 2017.

5. A. Gupta and N. K. Walia, "Cryptography Algorithms: A Review," NTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH, vol. 2, no. 2, pp. 1667-1672,2014.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3