SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 7(July 2013), PP.01-07
www.irjes.com
www.irjes.com 1 | Page
Protecting Computer Network with Encryption Technique: A
Study
1
Pavan Kunchur, 2
Veeranna Kotagi, 3
Prasad Kulkarni
1
MTech(DCN),Bagalkot,Karnataka,
2
Asst.Prof,LNBCIET,Raigoan,Satara,Maharashtra,
3
Lecturer,Margadarshan,BCA college,Bagalkot,Karnataka,
ABSTRACT:- In today’s world the networking plays a very important role in our life. Most of the activities
occur through the Internet. For the safe and secured exchange of information, we need to have security. The
encryption has very wide applications for securing data. Latest authentication deals with biometric application
such as fingerprint and retina scan. The different types of encryptions and their strength and standards are
discussed.
Keywords:- Encryption, Network Security, Authentication, Biometric.
I. INTRODUCTION
Today‟s global village concept has brought the many unknown people together via electronic media
and information technology. Most of the people in today‟s world are familiar with Internet, World Wide Web
applications, out of these people 40% [1] of them are still uses the unsafe browsing facility. As we talk about
global village, there are many transactions happening each and every second of time, between people. To make
sure that they do safe transactions every time, there must be some technology, which assures and safeties of
usage. This is known to be Encryption. The concepts of Encryption is very old, as Greek General use to send
his message from one place to other place through his messengers using scytale, a thin cylinder made out of
wood [2], message will written on the parchment, if someone tries to read the message will appear nonsense.
But if the other General receives the parchment he has to wrap it on the similar scytale to read the message. As
the day passed the techniques were changed. Now to decode the Encrypted message will take millions of years.
Why we really worry about our transactions? Do we do it in secure way all the time? Because the
internet has so many vast connections, as we do not have control over the activities such as hacking, sniffing,
breach of conduct, etc. So what is our solution to this problem? For this, we really need to come up with robust
system, the system that is difficult to break! The birth of Modern Cryptography has taken place in 1970‟s.
“Cryptographic systems are characterized along three independent dimensions, the type of operations used
transforming plaintext to cipher-text, the number of keys used and the way in which the plaintext is processed”
[3].On the other hand we have two methods to analyze the cryptography, one is Cryptanalysis and second one
is Brute-force attack. These are the independent technique to know which cryptography method is adopted.
II. WHAT IS ENCRYPTION?
Encryption refers to set of algorithms, which are used to convert the plain text to code or the
unreadable form of text, and provides privacy. To decrypt the text the receiver uses the “key” for the encrypted
text. It has been the old method of securing the data, which is very important for the military and the
government operations. Now it has stepped into the civilian‟s day-to-day life too. The online transactions of
banks, the data transfer via networks, exchange of vital personal information etc. that requires the application
of encryption for security reasons.
Whether we really understand what the encryption does in our day-to-day life, but we uses often. As
now most of the business completely depended upon the internet for to buy, sell, and transfer money over e-
banking system, organize, teleconference, provide various services all need the encryption for safe connection
and privacy. Earlier computers didn‟t have the networking facility. As the growth of networking industry the
software‟s more readily available for the individuals. The advantage of the business over the internet is
realized and to keep the unauthorized people away from the network the encryption is started taking its own
importance.
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 2 | Page
III. BASIC MODEL OF NETWORK SECURITY
It requires the some basic structure like,
a) An algorithm, which transforms the important security, related activity
b) A secret data that is used in the algorithm
c) Building of methods for sharing and distribution of secret data and
d) Define the protocol, which makes use of both algorithm and secret data to have security service.
As we can see in the below model, the network model has basic structure. Opponents will try to surpass the
safety barrier to get the required information. The message that is travelling through the information channel is
not in the simple format. It got blended with the secret message, which contains the cipher text and keys
provided by the trusted 3rd party for encryption. Unless one knows the key to decrypt, they cannot get the
message properly. Encryption keeps the message safe and secure, till it reaches the desired recipient. [4]
Fig. 1 Block Diagram for Network Security
IV. CLASSIFICATION OF ENCRYPTION
4.1 Symmetric Key
It is also known as single key encryption. It uses the same key for both the encryption and decryption
of text. Types of algorithms for Symmetric Key:
Stream Cipher: Here the plain text are encrypted one at a time, each bits of plain text are converted into
successive varying digits. Ex. RC4, SEAL
Sample Example:
“We are spartans“ is written as “ZH DUE VSDUWDQV”
Fig.2. Caser Cipher
Block Cipher: Here block of plain texts are encrypted, each block has fixed length and unvarying digits.
Ex. Rijndael, IDEA (International Data EncryptionAlgorithm) Sample Example:
“We are spartans“ is written as “ 25 51 11 24 51 34 53 11 24 44 11 33 34 ”
Fig.3 Block Cipher
4.2 Asymmetric Key
It uses the two different keys for encryption and decryption, public key is used for the encryption and
private key is used for decryption. As the symmetric key encryption does not provide much of the security, the
importance of the Asymmetric key is more. It is also known as Public key encryption. It has the combination
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 3 | Page
of public key and private key, private key is only known by your computer while the public key is given to
other computers with which it wants to communicate securely.
As everyone has the public key, but to decode the message one has to use the private key. The
combination key is based on the prime numbers, thus it makes highly secure. As many as prime numbers are
there, that many keys are available. Pretty Good Privacy (PGP) is one of most public key encryption
program.[5]
Public key encryption can be adopted in large scale, such as for web server and the application to be
secure. The Digital Certificate or digital signature gives the authentication between the users. These certificates
can be obtained by the Certificate Authority, which plays the role as a middleman for both the users.
Fig.4 Public Key Encryption Model
4.2.1 Public Key Infrastructure (PKI)
To make most out of the encryption, the public keys must be built to create, maintain, use and
distribute, we need the organization known as Public Key Infrastructure.
4.2.2 Certificate Authority (CA)
Without the CA one cannot issue the Digital Certificate, which contains both the public and private
key for encrypt and decrypt the data. Depending upon the volume of the identity verification, Certificate
Authority can issue Digital Certificate for different level of trust.
CA adopts identifying individual rather going by company. To verify individual CA can ask for
Driver License as proof of identity or Notarized letter. This is only applicable for initial level of trust. For high
level trust it can go for biometric information like fingerprint, iris scan etc .[6]
4.2.3 Registration Authorities (RAs)
These have similar functionality as the CA has, but RAs are one down to the level of hierarchy. This
will work under the CA, mainly to reduce the workload of Certificate Authority. The RA can issue the
temporary digital certificates. The temporary digital certificates have limited validity, and not fully trusted,
unless CA verifies them completely.[6]
4.2.4 Digital Certificates
These certificates are used to verify the identity of a person or a company through CA. It can also be
used to retrieve rights and authority. Some of them have limited access such as encrypt and decrypt. These
Digital Certificates can be issued for particular laptops, computers, routers etc. Computers and web browsers
have the facility to store these certificates in particular memory. [6]
4.2.5 RSA
It most recognized asymmetric algorithm, the RSA stands for the last names of the inventors Ron
Rivest, Adi Shamir, and Leonard Adleman. They developed this algorithm in 1978, since then it is widely
used. There are other algorithms used to generate the asymmetric keys, such as ElGamel and Rabin, but not
popular as RSA, because a large corporation RSA Data Security stands behinds it.
V. SECURE SOCKETS LAYER (SSL) AND TRANSPORT LAYER SECURITY
(TSL)[7]
The encryption is properly adopted for Secure Sockets Layer, Netscape has first developed it, SSL is
basically meant for Internet security protocol used by the web servers and browsers. It became the main part of
security known as Transport Layer Security. SSL and TSL make use of CA (Certificate Authority), whenever
browser retrieves secure web page there will an additional „s‟ after the „http‟.
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 4 | Page
The browser checks three things while sending the public key and certificate,
1. Is that the certificate is valid
2. Is that the certificate comes from trusted party
3. The certificate has the proper relation with web site, which it is coming from. While initiating a
secured connection between the two computers, one will generate thesymmetric key and sends to
other using public key encryption. Then the two computers can have safe communication using symmetric
key encryption. Once the session is over, each will discard the symmetric key used for that particular
session. For next session it requires again fresh keys, and cycle is repeated.
VI. SECURITY ATTACKS [8]
More is the benefits; it‟s more the risk always. As the more people benefits from the
Internet, networking the more will be the security attacks too. The attacks may have the proper
intention, such as stealing the user names, passwords, credit card details, social security numbers, personal
identification numbers, or any others details which can be used and have the benefits and services.
There are mainly two types:
1. Passive attack and
2. Active attack
6.1 Passive attack
It has no harm on system resources, but it tries to learn and makes use of system information. An
unauthorized party or a person gain access to the system but eventually cannot modify the content or the data.
The pattern of communication is observed and makes use of this information for attack. It is also known as
Traffic analysis.
6.2 Active attack
It tries to alter the system resources and also has the adverse effects on their operation. In this attack
the unauthorized person successfully gets into the system and has the ability to modify the message, data
stream or a file. The attacks may of any kind, replay, masquerading, message modification and denial of
service (DoS).
VII. ENCRYPTION STANDARDS [9]
7.1 Data Encryption Standards (DES)
The most commonly used encryption programs are based on the Data Encryption Standard, which is
implemented in 1977 by National Bureau of Standards (NBS), now it is known as Institute of Standards and
Technology (NIST). The algorithm that is used for the data is known as Data Encryption Algorithm. It has the
key length of 56 bit. It takes the 64bit block data and encrypts using the 56bit key. The possible combination
for the 256
is over 72,000,000,000,000,000 keys. It is considered as secured, but as the time passed the speed of
the computers increased tremendously. To break this key today‟s computer can take very short time. (See
Table 1)
Different versions of DES are Federal Information Processing Standard (FIPS PUB 46), FIPS PUB
46-2, and 3. FIPS PUB 46-3 is revised version and introduced in 1997. The strength of DES depends upon the
two things, one is the Key Length and second thing is depended on the nature of the algorithm used.
7.2 Advanced Encryption Standards (AES)
Because of the small key length the DES is no longer considered as safe for today‟s applications.
AES come up with key length 128bit using the symmetric block cipher. It has also different key size as 192bits
and 256bits. Rijndael is the algorithm that is adopted in AES. Vincent Rijmen and Joan Daeman develop this
AES algorithm. This is chosen over 15 contestants, the contest is organized by NIST (National Institute of
Standards and Technology) in 1997, and it took three years to come-up with final winner, which survived all
the tests. The possible key combination for this algorithm will be 2128
is over 3.4x1038
keys, which is much
stronger as compared to DES. To crack the code time taken by the computer will be in years.
Table1. Average Time Required for Exhaustive Key Search.
Key Size Number of Alternative Time Required at Time required at 106
(Bits) Keys 1 Encryption / μs Encryptions / μs
56 (DES) 256 =7.2X 255μs = 1141 10.01 hours
1016 years
128(AES) 2128=3.4X 2127μs = 5.4 X X 1018 years
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 5 | Page
1038 1024 years
VIII. HOW THE ENCRYPTED TEXT LOOK LIKE?
Below is the sample of encrypted text:
OT8Hj8uA7inuG2tq5YjID5mESlm2F7exsc0X3fnZRFZhk8YCEpbnDLtOfSAGdK9+cO7/D
b3MFlPJwCcAzlCJMElczhvsf2qVAcTDmsMEt3TVQFqolayND7cj4ldksCL3JDu83wup6wu
YZnw05QekQ3MGd3heMpqk4Yx3211yfV7SEQQoUAlz3Y6TwyzC5UWehb0a2dIWils1v6
ZGZ1aVzih3AmrK53+JVQ0pBMj6wbRq/LRtZvoPNA2qLUZE4o4UTKH5G9ElnqrnxBvt3
WukDcm1BxdwEtTCY9K/7Qq6X8=
Actual Plain Text:
“Encryption refers to set of algorithms which are used to convert the plain text to code or the unreadable form
of text and provides privacy. To decrypt the text the receiver uses the “key” for the encrypted text”. [10]
IX. APPLICATIONS OF ENCRYPTION
9.1 Data Protection
The wide application of encryption is in the field of data protection. The data that is there in the
computers is invaluable for the person or the company that owns it. Encryption is necessary for safeguarding
the data or the information. The common application of encryption is such as files and email encryption.
Encryption protects the stored data on hard disk; the situation like theft of a computer or the attacker
successfully hacks in into a system. The managing the encryption becomes more difficult as the access to the
system increases. If the people working in a particular company are more the sharing of the key will be more,
hence it reduces the effectiveness of encryption.
9.2 Authentication
It means the proof of identification. As the user wants to login or sign-in, to the system using the user
name or ID and password, the details are sent over network using the encryption. This can be verified as soon
as the login page appears on the browser; an additional „s‟ will appear next the http. It means it‟s secured.
Whenever we use the online banking for transactions we need to confirm, whether we secured or not by
looking into the address bar and a padlock sign at the bottom or in the same address bar of the browser. (See
fig. 5)
Fig. 5 HTTPS and PAD LOCK in Address Bar
X. BIOMETRIC AUTHENTICATION [11]
Some of the advanced systems require the biometric authentication. For log in into the very
sophisticated laptops it may have face recognition system or the fingerprint scanning. Some of the biometric
authentications include,
1. Iris scan (Retina scan)
2. Face recognition
3. Voice recognition
4. Finger print
10.1 Biometric Encryption (BE)
Biometric encryption is the process that binds the PIN or key to biometric. It is not possible to get key
or biometric from the stored master file / template. The key can be re-recreated only by producing the live
biometric sample on the verification.
The digital key is randomly generated up on sign up; the user will not have the clue about it. The key
is completely independent of the biometrics. Once the biometric is obtained the biometric algorithm will attach
the key to the biometric securely, and stores as the private template. Once the registration is over both key and
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 6 | Page
biometrics are discarded. On verification applicant will provide a fresh biometric to retrieve the PIN when it is
applied over a legitimate BE template. If the biometric is not correct, then they will not get the PIN for the
further application or use. The BE algorithm itself provides the decryption key. Advantages of Biometric
Encryption:
1. No storage of personal data required. No retention of biometric information or the template.
2. Multiple/ cancelable / revocable Identifier
3. No tempering
4. No substitution attacks
5. Improved authentication security
XI. FUTURE SCOPE OF ENCRYPTION
In today‟s world the protection of sensitive data is one of the most critical concerns for organizations
and their customers. This, coupled with growing regulatory pressures, is forcing businesses to protect the
integrity, privacy and security of critical information. As a result cryptography is emerging as the foundation
for enterprise data security and compliance, and quickly becoming the foundation of security best practice.
Cryptography, once seen as a specialized, esoteric discipline of information security ,is finally coming of age.
No one would argue that cryptography and encryption are new technologies. It was true decades ago
and it is still true today – encryption is the most reliable way to secure data. National security agencies and
major financial institutions have long protected their sensitive data using cryptography and encryption. Today
the use of encryption is growing rapidly, being deployed in a much wider set of industry sectors and across an
increasing range of applications and platforms. Put simply, cryptography and encryption have become one of
the hottest technologies in the IT security industry – the challenge now is to ensure that IT organizations are
equipped to handle this shift and are laying the groundwork today to satisfy their future needs [12].
XII. CONCLUSION
The advantages of the networking is tremendous, the applications are vast. It saves the lot of time and
energy. It has touched almost all fields, where you cannot say we don‟t need network anymore. Education,
commercial to life saving telemedicine application everything is dependent on networking. To make it happen
the services should be reliable and secured. The Encryption serves the purpose all time and every time.
XIII. GLOSSARY
Authentication A process used to verify the integrity of transmitted data, mainly messages
Block Cipher It is a type of symmetric encryption algorithm, which takes a large block of plain text bits and
converts into a whole cipher text block of the same equal length. The size of the block is 64 bit.
Cipher It is usually replace the plain text with another object mainly to cover the meaning; the replacement is
controlled by key.
Cipher text The form of encrypted text; an output from the encryption algorithm.
Code The replacement of original data to some other data with or without fixed rules. Cryptanalysis A branch
of cryptography deals with decode of cipher to recover the data.
Cryptography The branch of cryptology dealing with formation of algorithms for encryption and decryption,
indented to secure the data or the message.
Decryption The process of transformation of encrypted text to the original readable text.
It‟s also known as deciphering.
Encryption The process of conversion of plain text into unreadable form, it‟s also known as enciphering.
Key The value by which the algorithm does its encryption or the decryption of text. Private Key The key
which is known by the creator, and used in asymmetric encryption.
Public Key It is one of the key which is used in asymmetric encryption for securing the data.
Secret This key is same for both the user for encrypt and to decrypt the data, used in symmetric Encryption
method.
Protecting Computer Network with Encryption Technique: A Study
www.irjes.com 7 | Page
REFERENCES
[1] Brian Krebs, The Washington Post,“Forty Percent of Web Users Surf with Unsafe Browsers” July 1,
2008.
[2] Jeff Tyson „How Encryption works: Introduction to How Encryption works‟
[3] William Stallings Cryptography and Network Security: Principles and Practices, 3rd ed. USA: Pearson
Education, Inc and Dorling Kindersley Publishing Inc. p.45, 2006.
[4] William Stallings Cryptography and Network Security: Principles and Practices, 3rd ed. USA: Pearson
Education, Inc and Dorling Kindersley Publishing Inc. p.32-33, 2006.
[5] Jon Callas, „An Introduction to Cryptography‟, Sept.2006.
[6] Chey Cobb, „ Cryptography For Dummies The PKIPrimer‟, John Wiley and Sons, 2004.
[7] Jeff Tyson, „How Encryption works: SSL and TSL‟,How stuff works website.
[8] William Stallings, „Cryptography and NetworkSecurity: Principles and Practices‟, 3rd ed. USA:
Pearson Education, Inc and Dorling Kindersley Publishing Inc. p.29, 2006.
[9] William Stallings, „Cryptography and NetworkSecurity: Principles and Practices‟, 3rd ed. USA:
PearsonEducation, Inc and Dorling Kindersley Publishing Inc. pp. 90,150. 2006.
[10] Online encryption software, Available HTTP: http://infoencrypt.com/
[11] Ann Cavoukian and Alex Stoianov, „Biometric Encryption: A Positive-Sum Technology that AczievesStrong
Authentication, Security and Privacy‟, p.15, March2006.
[12] Richard Moulds, „The Future of Encryption‟, nCipher website ,2008

Mais conteúdo relacionado

Mais procurados

Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODVijsrd.com
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismConference Papers
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 

Mais procurados (18)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
cryptography
cryptographycryptography
cryptography
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
Security
SecuritySecurity
Security
 

Destaque

D223034
D223034D223034
D223034irjes
 
C211824
C211824C211824
C211824irjes
 
Mayra Naturaleza
Mayra NaturalezaMayra Naturaleza
Mayra Naturaleza0987086358
 
E233137
E233137E233137
E233137irjes
 
H244654
H244654H244654
H244654irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
B130512
B130512B130512
B130512irjes
 
G234353
G234353G234353
G234353irjes
 
D242228
D242228D242228
D242228irjes
 

Destaque (10)

D223034
D223034D223034
D223034
 
C211824
C211824C211824
C211824
 
Mayra Naturaleza
Mayra NaturalezaMayra Naturaleza
Mayra Naturaleza
 
E233137
E233137E233137
E233137
 
H244654
H244654H244654
H244654
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
B130512
B130512B130512
B130512
 
G234353
G234353G234353
G234353
 
D242228
D242228D242228
D242228
 

Semelhante a International Refereed Journal of Engineering and Science (IRJES)

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 

Semelhante a International Refereed Journal of Engineering and Science (IRJES) (16)

L017136269
L017136269L017136269
L017136269
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
J017667582
J017667582J017667582
J017667582
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Network Security
Network SecurityNetwork Security
Network Security
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 

Mais de irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

Mais de irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

Último

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

International Refereed Journal of Engineering and Science (IRJES)

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 7(July 2013), PP.01-07 www.irjes.com www.irjes.com 1 | Page Protecting Computer Network with Encryption Technique: A Study 1 Pavan Kunchur, 2 Veeranna Kotagi, 3 Prasad Kulkarni 1 MTech(DCN),Bagalkot,Karnataka, 2 Asst.Prof,LNBCIET,Raigoan,Satara,Maharashtra, 3 Lecturer,Margadarshan,BCA college,Bagalkot,Karnataka, ABSTRACT:- In today’s world the networking plays a very important role in our life. Most of the activities occur through the Internet. For the safe and secured exchange of information, we need to have security. The encryption has very wide applications for securing data. Latest authentication deals with biometric application such as fingerprint and retina scan. The different types of encryptions and their strength and standards are discussed. Keywords:- Encryption, Network Security, Authentication, Biometric. I. INTRODUCTION Today‟s global village concept has brought the many unknown people together via electronic media and information technology. Most of the people in today‟s world are familiar with Internet, World Wide Web applications, out of these people 40% [1] of them are still uses the unsafe browsing facility. As we talk about global village, there are many transactions happening each and every second of time, between people. To make sure that they do safe transactions every time, there must be some technology, which assures and safeties of usage. This is known to be Encryption. The concepts of Encryption is very old, as Greek General use to send his message from one place to other place through his messengers using scytale, a thin cylinder made out of wood [2], message will written on the parchment, if someone tries to read the message will appear nonsense. But if the other General receives the parchment he has to wrap it on the similar scytale to read the message. As the day passed the techniques were changed. Now to decode the Encrypted message will take millions of years. Why we really worry about our transactions? Do we do it in secure way all the time? Because the internet has so many vast connections, as we do not have control over the activities such as hacking, sniffing, breach of conduct, etc. So what is our solution to this problem? For this, we really need to come up with robust system, the system that is difficult to break! The birth of Modern Cryptography has taken place in 1970‟s. “Cryptographic systems are characterized along three independent dimensions, the type of operations used transforming plaintext to cipher-text, the number of keys used and the way in which the plaintext is processed” [3].On the other hand we have two methods to analyze the cryptography, one is Cryptanalysis and second one is Brute-force attack. These are the independent technique to know which cryptography method is adopted. II. WHAT IS ENCRYPTION? Encryption refers to set of algorithms, which are used to convert the plain text to code or the unreadable form of text, and provides privacy. To decrypt the text the receiver uses the “key” for the encrypted text. It has been the old method of securing the data, which is very important for the military and the government operations. Now it has stepped into the civilian‟s day-to-day life too. The online transactions of banks, the data transfer via networks, exchange of vital personal information etc. that requires the application of encryption for security reasons. Whether we really understand what the encryption does in our day-to-day life, but we uses often. As now most of the business completely depended upon the internet for to buy, sell, and transfer money over e- banking system, organize, teleconference, provide various services all need the encryption for safe connection and privacy. Earlier computers didn‟t have the networking facility. As the growth of networking industry the software‟s more readily available for the individuals. The advantage of the business over the internet is realized and to keep the unauthorized people away from the network the encryption is started taking its own importance.
  • 2. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 2 | Page III. BASIC MODEL OF NETWORK SECURITY It requires the some basic structure like, a) An algorithm, which transforms the important security, related activity b) A secret data that is used in the algorithm c) Building of methods for sharing and distribution of secret data and d) Define the protocol, which makes use of both algorithm and secret data to have security service. As we can see in the below model, the network model has basic structure. Opponents will try to surpass the safety barrier to get the required information. The message that is travelling through the information channel is not in the simple format. It got blended with the secret message, which contains the cipher text and keys provided by the trusted 3rd party for encryption. Unless one knows the key to decrypt, they cannot get the message properly. Encryption keeps the message safe and secure, till it reaches the desired recipient. [4] Fig. 1 Block Diagram for Network Security IV. CLASSIFICATION OF ENCRYPTION 4.1 Symmetric Key It is also known as single key encryption. It uses the same key for both the encryption and decryption of text. Types of algorithms for Symmetric Key: Stream Cipher: Here the plain text are encrypted one at a time, each bits of plain text are converted into successive varying digits. Ex. RC4, SEAL Sample Example: “We are spartans“ is written as “ZH DUE VSDUWDQV” Fig.2. Caser Cipher Block Cipher: Here block of plain texts are encrypted, each block has fixed length and unvarying digits. Ex. Rijndael, IDEA (International Data EncryptionAlgorithm) Sample Example: “We are spartans“ is written as “ 25 51 11 24 51 34 53 11 24 44 11 33 34 ” Fig.3 Block Cipher 4.2 Asymmetric Key It uses the two different keys for encryption and decryption, public key is used for the encryption and private key is used for decryption. As the symmetric key encryption does not provide much of the security, the importance of the Asymmetric key is more. It is also known as Public key encryption. It has the combination
  • 3. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 3 | Page of public key and private key, private key is only known by your computer while the public key is given to other computers with which it wants to communicate securely. As everyone has the public key, but to decode the message one has to use the private key. The combination key is based on the prime numbers, thus it makes highly secure. As many as prime numbers are there, that many keys are available. Pretty Good Privacy (PGP) is one of most public key encryption program.[5] Public key encryption can be adopted in large scale, such as for web server and the application to be secure. The Digital Certificate or digital signature gives the authentication between the users. These certificates can be obtained by the Certificate Authority, which plays the role as a middleman for both the users. Fig.4 Public Key Encryption Model 4.2.1 Public Key Infrastructure (PKI) To make most out of the encryption, the public keys must be built to create, maintain, use and distribute, we need the organization known as Public Key Infrastructure. 4.2.2 Certificate Authority (CA) Without the CA one cannot issue the Digital Certificate, which contains both the public and private key for encrypt and decrypt the data. Depending upon the volume of the identity verification, Certificate Authority can issue Digital Certificate for different level of trust. CA adopts identifying individual rather going by company. To verify individual CA can ask for Driver License as proof of identity or Notarized letter. This is only applicable for initial level of trust. For high level trust it can go for biometric information like fingerprint, iris scan etc .[6] 4.2.3 Registration Authorities (RAs) These have similar functionality as the CA has, but RAs are one down to the level of hierarchy. This will work under the CA, mainly to reduce the workload of Certificate Authority. The RA can issue the temporary digital certificates. The temporary digital certificates have limited validity, and not fully trusted, unless CA verifies them completely.[6] 4.2.4 Digital Certificates These certificates are used to verify the identity of a person or a company through CA. It can also be used to retrieve rights and authority. Some of them have limited access such as encrypt and decrypt. These Digital Certificates can be issued for particular laptops, computers, routers etc. Computers and web browsers have the facility to store these certificates in particular memory. [6] 4.2.5 RSA It most recognized asymmetric algorithm, the RSA stands for the last names of the inventors Ron Rivest, Adi Shamir, and Leonard Adleman. They developed this algorithm in 1978, since then it is widely used. There are other algorithms used to generate the asymmetric keys, such as ElGamel and Rabin, but not popular as RSA, because a large corporation RSA Data Security stands behinds it. V. SECURE SOCKETS LAYER (SSL) AND TRANSPORT LAYER SECURITY (TSL)[7] The encryption is properly adopted for Secure Sockets Layer, Netscape has first developed it, SSL is basically meant for Internet security protocol used by the web servers and browsers. It became the main part of security known as Transport Layer Security. SSL and TSL make use of CA (Certificate Authority), whenever browser retrieves secure web page there will an additional „s‟ after the „http‟.
  • 4. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 4 | Page The browser checks three things while sending the public key and certificate, 1. Is that the certificate is valid 2. Is that the certificate comes from trusted party 3. The certificate has the proper relation with web site, which it is coming from. While initiating a secured connection between the two computers, one will generate thesymmetric key and sends to other using public key encryption. Then the two computers can have safe communication using symmetric key encryption. Once the session is over, each will discard the symmetric key used for that particular session. For next session it requires again fresh keys, and cycle is repeated. VI. SECURITY ATTACKS [8] More is the benefits; it‟s more the risk always. As the more people benefits from the Internet, networking the more will be the security attacks too. The attacks may have the proper intention, such as stealing the user names, passwords, credit card details, social security numbers, personal identification numbers, or any others details which can be used and have the benefits and services. There are mainly two types: 1. Passive attack and 2. Active attack 6.1 Passive attack It has no harm on system resources, but it tries to learn and makes use of system information. An unauthorized party or a person gain access to the system but eventually cannot modify the content or the data. The pattern of communication is observed and makes use of this information for attack. It is also known as Traffic analysis. 6.2 Active attack It tries to alter the system resources and also has the adverse effects on their operation. In this attack the unauthorized person successfully gets into the system and has the ability to modify the message, data stream or a file. The attacks may of any kind, replay, masquerading, message modification and denial of service (DoS). VII. ENCRYPTION STANDARDS [9] 7.1 Data Encryption Standards (DES) The most commonly used encryption programs are based on the Data Encryption Standard, which is implemented in 1977 by National Bureau of Standards (NBS), now it is known as Institute of Standards and Technology (NIST). The algorithm that is used for the data is known as Data Encryption Algorithm. It has the key length of 56 bit. It takes the 64bit block data and encrypts using the 56bit key. The possible combination for the 256 is over 72,000,000,000,000,000 keys. It is considered as secured, but as the time passed the speed of the computers increased tremendously. To break this key today‟s computer can take very short time. (See Table 1) Different versions of DES are Federal Information Processing Standard (FIPS PUB 46), FIPS PUB 46-2, and 3. FIPS PUB 46-3 is revised version and introduced in 1997. The strength of DES depends upon the two things, one is the Key Length and second thing is depended on the nature of the algorithm used. 7.2 Advanced Encryption Standards (AES) Because of the small key length the DES is no longer considered as safe for today‟s applications. AES come up with key length 128bit using the symmetric block cipher. It has also different key size as 192bits and 256bits. Rijndael is the algorithm that is adopted in AES. Vincent Rijmen and Joan Daeman develop this AES algorithm. This is chosen over 15 contestants, the contest is organized by NIST (National Institute of Standards and Technology) in 1997, and it took three years to come-up with final winner, which survived all the tests. The possible key combination for this algorithm will be 2128 is over 3.4x1038 keys, which is much stronger as compared to DES. To crack the code time taken by the computer will be in years. Table1. Average Time Required for Exhaustive Key Search. Key Size Number of Alternative Time Required at Time required at 106 (Bits) Keys 1 Encryption / μs Encryptions / μs 56 (DES) 256 =7.2X 255μs = 1141 10.01 hours 1016 years 128(AES) 2128=3.4X 2127μs = 5.4 X X 1018 years
  • 5. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 5 | Page 1038 1024 years VIII. HOW THE ENCRYPTED TEXT LOOK LIKE? Below is the sample of encrypted text: OT8Hj8uA7inuG2tq5YjID5mESlm2F7exsc0X3fnZRFZhk8YCEpbnDLtOfSAGdK9+cO7/D b3MFlPJwCcAzlCJMElczhvsf2qVAcTDmsMEt3TVQFqolayND7cj4ldksCL3JDu83wup6wu YZnw05QekQ3MGd3heMpqk4Yx3211yfV7SEQQoUAlz3Y6TwyzC5UWehb0a2dIWils1v6 ZGZ1aVzih3AmrK53+JVQ0pBMj6wbRq/LRtZvoPNA2qLUZE4o4UTKH5G9ElnqrnxBvt3 WukDcm1BxdwEtTCY9K/7Qq6X8= Actual Plain Text: “Encryption refers to set of algorithms which are used to convert the plain text to code or the unreadable form of text and provides privacy. To decrypt the text the receiver uses the “key” for the encrypted text”. [10] IX. APPLICATIONS OF ENCRYPTION 9.1 Data Protection The wide application of encryption is in the field of data protection. The data that is there in the computers is invaluable for the person or the company that owns it. Encryption is necessary for safeguarding the data or the information. The common application of encryption is such as files and email encryption. Encryption protects the stored data on hard disk; the situation like theft of a computer or the attacker successfully hacks in into a system. The managing the encryption becomes more difficult as the access to the system increases. If the people working in a particular company are more the sharing of the key will be more, hence it reduces the effectiveness of encryption. 9.2 Authentication It means the proof of identification. As the user wants to login or sign-in, to the system using the user name or ID and password, the details are sent over network using the encryption. This can be verified as soon as the login page appears on the browser; an additional „s‟ will appear next the http. It means it‟s secured. Whenever we use the online banking for transactions we need to confirm, whether we secured or not by looking into the address bar and a padlock sign at the bottom or in the same address bar of the browser. (See fig. 5) Fig. 5 HTTPS and PAD LOCK in Address Bar X. BIOMETRIC AUTHENTICATION [11] Some of the advanced systems require the biometric authentication. For log in into the very sophisticated laptops it may have face recognition system or the fingerprint scanning. Some of the biometric authentications include, 1. Iris scan (Retina scan) 2. Face recognition 3. Voice recognition 4. Finger print 10.1 Biometric Encryption (BE) Biometric encryption is the process that binds the PIN or key to biometric. It is not possible to get key or biometric from the stored master file / template. The key can be re-recreated only by producing the live biometric sample on the verification. The digital key is randomly generated up on sign up; the user will not have the clue about it. The key is completely independent of the biometrics. Once the biometric is obtained the biometric algorithm will attach the key to the biometric securely, and stores as the private template. Once the registration is over both key and
  • 6. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 6 | Page biometrics are discarded. On verification applicant will provide a fresh biometric to retrieve the PIN when it is applied over a legitimate BE template. If the biometric is not correct, then they will not get the PIN for the further application or use. The BE algorithm itself provides the decryption key. Advantages of Biometric Encryption: 1. No storage of personal data required. No retention of biometric information or the template. 2. Multiple/ cancelable / revocable Identifier 3. No tempering 4. No substitution attacks 5. Improved authentication security XI. FUTURE SCOPE OF ENCRYPTION In today‟s world the protection of sensitive data is one of the most critical concerns for organizations and their customers. This, coupled with growing regulatory pressures, is forcing businesses to protect the integrity, privacy and security of critical information. As a result cryptography is emerging as the foundation for enterprise data security and compliance, and quickly becoming the foundation of security best practice. Cryptography, once seen as a specialized, esoteric discipline of information security ,is finally coming of age. No one would argue that cryptography and encryption are new technologies. It was true decades ago and it is still true today – encryption is the most reliable way to secure data. National security agencies and major financial institutions have long protected their sensitive data using cryptography and encryption. Today the use of encryption is growing rapidly, being deployed in a much wider set of industry sectors and across an increasing range of applications and platforms. Put simply, cryptography and encryption have become one of the hottest technologies in the IT security industry – the challenge now is to ensure that IT organizations are equipped to handle this shift and are laying the groundwork today to satisfy their future needs [12]. XII. CONCLUSION The advantages of the networking is tremendous, the applications are vast. It saves the lot of time and energy. It has touched almost all fields, where you cannot say we don‟t need network anymore. Education, commercial to life saving telemedicine application everything is dependent on networking. To make it happen the services should be reliable and secured. The Encryption serves the purpose all time and every time. XIII. GLOSSARY Authentication A process used to verify the integrity of transmitted data, mainly messages Block Cipher It is a type of symmetric encryption algorithm, which takes a large block of plain text bits and converts into a whole cipher text block of the same equal length. The size of the block is 64 bit. Cipher It is usually replace the plain text with another object mainly to cover the meaning; the replacement is controlled by key. Cipher text The form of encrypted text; an output from the encryption algorithm. Code The replacement of original data to some other data with or without fixed rules. Cryptanalysis A branch of cryptography deals with decode of cipher to recover the data. Cryptography The branch of cryptology dealing with formation of algorithms for encryption and decryption, indented to secure the data or the message. Decryption The process of transformation of encrypted text to the original readable text. It‟s also known as deciphering. Encryption The process of conversion of plain text into unreadable form, it‟s also known as enciphering. Key The value by which the algorithm does its encryption or the decryption of text. Private Key The key which is known by the creator, and used in asymmetric encryption. Public Key It is one of the key which is used in asymmetric encryption for securing the data. Secret This key is same for both the user for encrypt and to decrypt the data, used in symmetric Encryption method.
  • 7. Protecting Computer Network with Encryption Technique: A Study www.irjes.com 7 | Page REFERENCES [1] Brian Krebs, The Washington Post,“Forty Percent of Web Users Surf with Unsafe Browsers” July 1, 2008. [2] Jeff Tyson „How Encryption works: Introduction to How Encryption works‟ [3] William Stallings Cryptography and Network Security: Principles and Practices, 3rd ed. USA: Pearson Education, Inc and Dorling Kindersley Publishing Inc. p.45, 2006. [4] William Stallings Cryptography and Network Security: Principles and Practices, 3rd ed. USA: Pearson Education, Inc and Dorling Kindersley Publishing Inc. p.32-33, 2006. [5] Jon Callas, „An Introduction to Cryptography‟, Sept.2006. [6] Chey Cobb, „ Cryptography For Dummies The PKIPrimer‟, John Wiley and Sons, 2004. [7] Jeff Tyson, „How Encryption works: SSL and TSL‟,How stuff works website. [8] William Stallings, „Cryptography and NetworkSecurity: Principles and Practices‟, 3rd ed. USA: Pearson Education, Inc and Dorling Kindersley Publishing Inc. p.29, 2006. [9] William Stallings, „Cryptography and NetworkSecurity: Principles and Practices‟, 3rd ed. USA: PearsonEducation, Inc and Dorling Kindersley Publishing Inc. pp. 90,150. 2006. [10] Online encryption software, Available HTTP: http://infoencrypt.com/ [11] Ann Cavoukian and Alex Stoianov, „Biometric Encryption: A Positive-Sum Technology that AczievesStrong Authentication, Security and Privacy‟, p.15, March2006. [12] Richard Moulds, „The Future of Encryption‟, nCipher website ,2008