Affiliation:
1. Indira Gandhi National Tribal University
Abstract
The dependence of humans on computers is increasing in today's era of technology. All transactions, as well as digital data transformations, are done with the help of the network, so third parties or intruders can attack the network to access data and use it in the wrong way. Organizations and individuals use the network for their work. Due to the easy availability of the internet, there is always a risk of information falling into the wrong hands. This paper presents a detailed study of networking attacks and security algorithms, as well as an analysis of various viable network attack observation tools to detect attacks. The algorithms discussed include Symmetric Key Algorithm, Asymmetric Key Algorithm, and their respective types.
Reference22 articles.
1. Abdullah, A. M. (2017). Advanced encryption
standard (AES) algorithm to encrypt and decrypt data.
Cryptography and Network Security, 16, 1-11.
2. Encryption quality analysis of the RC5 block cipher algorithm for digital images
3. Ciphertext-Policy Attribute-Based Encryption
4. Evaluating the Behavior of Aluminum Corrosion in Hydrochloric Acid in the Presence Aqueous Extract of Olive Seeds
5. Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks.
International Journal of Computer Applications, 9(12),
11-15.