Open Access   Article Go Back

Network Security and Methods of Encoding and Decoding

S. Kaur1 , R. Singh2 , S. Gagneja3

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-2 , Page no. 11-15, Feb-2014

Online published on Feb 28, 2014

Copyright © S. Kaur, R. Singh, S. Gagneja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Kaur, R. Singh, S. Gagneja , “Network Security and Methods of Encoding and Decoding,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.11-15, 2014.

MLA Style Citation: S. Kaur, R. Singh, S. Gagneja "Network Security and Methods of Encoding and Decoding." International Journal of Computer Sciences and Engineering 2.2 (2014): 11-15.

APA Style Citation: S. Kaur, R. Singh, S. Gagneja , (2014). Network Security and Methods of Encoding and Decoding. International Journal of Computer Sciences and Engineering, 2(2), 11-15.

BibTex Style Citation:
@article{Kaur_2014,
author = {S. Kaur, R. Singh, S. Gagneja },
title = {Network Security and Methods of Encoding and Decoding},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {11-15},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=44},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=44
TI - Network Security and Methods of Encoding and Decoding
T2 - International Journal of Computer Sciences and Engineering
AU - S. Kaur, R. Singh, S. Gagneja
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 11-15
IS - 2
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3878 3801 downloads 3692 downloads
  
  
           

Abstract

Network Security is the most vital component in data protection because it is responsible for protecting all information passed through computers containing network. Network Security refers to all hardware and software functions, characteristics, features, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Here we are focusing on the technique of Quantum Cryptography which uses the law of quantum physics for unconditionally secure data communications. This is an improvement because the cryptography currently in use, known as conventional cryptography, is dependent entirely on the difficulty level of a mathematical equation. To write this paper we have studied about Network Security and methods of encoding and decoding in detail. Hereby we are presenting our work on the enhancement of cryptography using various encoding and decoding approaches. The proposed algorithm has a better speed compared with other encoding algorithm. Nevertheless, the proposed algorithm improves encoding security by inserting the symmetric layer. The proposed algorithm will be useful to the applications which require the same procedure of encoding and decoding. This paper makes a comparison between classical cryptography and quantum cryptography and outlines the increased security level provided by quantum cryptography.

Key-Words / Index Term

Network security, Encoding, Decoding, Cryptography, Quantum Cryptography

References

[1] Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath �A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm� published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 � 2011 IEEE.
[2] Simmonds, A; Sandilands, P; van Ekert, L (2004) Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317�323.
[3] A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco.
[4] Dave Dietrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
[5] Sanchez-Avila, C. Sanchez-Reillol, R, ―The Rijndael block cipher (AES proposal): A comparison with DES‖, 35th International Conference on Security Technology 2001, IEEE.
[6] Symmetric key cryptography using random key generator,A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July, 2010, Vol-2,P-239-244.
[7] By Klaus Felten �An Algorithm for Symmetric Cryptography with a wide range of scalability� published by 2nd International Workshop on Embedded Systems, Internet Programming and Industrial IT.