Open Access   Article Go Back

A Review on Secured Network with Cryptographic Modelling

A. Suresh1 , M. Hemamalini2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 70-76, Feb-2019

Online published on Feb 28, 2019

Copyright © A. Suresh, M. Hemamalini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Suresh, M. Hemamalini, “A Review on Secured Network with Cryptographic Modelling,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.70-76, 2019.

MLA Style Citation: A. Suresh, M. Hemamalini "A Review on Secured Network with Cryptographic Modelling." International Journal of Computer Sciences and Engineering 07.04 (2019): 70-76.

APA Style Citation: A. Suresh, M. Hemamalini, (2019). A Review on Secured Network with Cryptographic Modelling. International Journal of Computer Sciences and Engineering, 07(04), 70-76.

BibTex Style Citation:
@article{Suresh_2019,
author = {A. Suresh, M. Hemamalini},
title = {A Review on Secured Network with Cryptographic Modelling},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {70-76},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=724},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=724
TI - A Review on Secured Network with Cryptographic Modelling
T2 - International Journal of Computer Sciences and Engineering
AU - A. Suresh, M. Hemamalini
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 70-76
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

In information network security is one of the most important elements because it is responsible for providing security to all information passed through network devices. System security includes the approval of access to information in a system and it will controlled by the system administrator. Cryptography gives secure correspondence within the sight of vindictive outsiders-known as foes. Cryptography is the way toward changing over standard plain text into cipher text. There are two sorts of cryptography they are symmetric and asymmetric. In symmetric frameworks use a similar key (the mystery key) to scramble and unscramble a message. In asymmetric frameworks use an open key to scramble a message and a private key to decode it. Utilization of uneven frameworks upgrade makes secure correspondence. Asymmetric frameworks incorporate RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve Cryptography). The proposed framework utilizes AEDA calculation for information encryption as a result of its significant points on high security, bring down CPU time and less memory use. In AEDA Encryption and Decryption techniques can just scramble and decode a pixel value. The Encoding (converting message to a point) and Decoding (changing over a point to a message) are imperative capacities in Encryption and Decryption in AEDA.

Key-Words / Index Term

Cryptography, Symmetric Key, Asymmetric Key, ECC, RSA, AEDA

References

[1] Jasmin Syed, J S Ananda Kumar “ Cryptography Algorithms For Providing Security To Data While Transferring Over Network” International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 ISSN 2229-5518
[2] William Stallings, “Cryptography and etwork Security: Principles and Practice”, Pearson Education/Prentice Hall, 5th Edition.
[3] E. Thambiraja, G. Ramesh and Dr. R. Umarani, "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 226-233, July 2012.
[4] Gurpreet Singh, Supriya “ A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” international Journal of Computer Applications (0975 – 8887) Volume 67– No.19, April 2013.
[5] William Stallings, Cryptography and Network Security, Principles and Practice. ed.,Prentice Hall, New Jersey,2003.
[6] Padma Bh, D.Chandravathi, P.Prapoorna Roja Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s MethodPadma Bh et. al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1904-1907
[7] R. Schoof. Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p. Mathematics of Computation, Vol. 44, No. 170, pp. 483-494, April 85.
[8] C. Nithiya, IIR. Sridevi ECC Algorithm & Security in CloudInternational Journal of Advanced Research in Computer Science & Technology (IJARCST 2016) Vol. 4, Issue 1 (Jan. - Mar. 2016)
[9] Atul Kahate “Cryptography and Network Security”, Tata McGraw-Hill Companies, 2008.
[10] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education,2004.
[11] Mitali, Vijay Kumar and Arvind Sharma, “A Survey on Various Cryptography Techniques” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 3, Issue 4, July-August 2014
[12] Samta Gajbhiy e,Dr. Sanjeev Karmakar, D r. Monisha Sharma,Dr. Sanjay Sharma, Dr. M K Kowar, “Application of Elliptic Curve Method in Cryptography: A Literature Review”, Samta Gajbhiye et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4499 - 4503
[13] Udayakumar R., Kaliyamurthie K.P., Khanaa, Thooyamani K.P., Data mining a boon: Predictive system for university topper women in academia, World Applied Sciences Journal, v-29, i-14, pp-86-90, 2014.
[14] Kaliyamurthie K.P., Parameswari D., Udayakumar R., QOS aware privacy preserving location monitoring in wireless sensor network, Indian Journal of Science and Technology, v-6, i-SUPPL5, pp-4648-4652, 2013.
[15] Brintha Rajakumari S., Nalini C., An efficient cost model for data storage with horizontal layout in the cloud, Indian Journal of Science and Technology, v-7, i-, pp-45-46, 2014.
[16] Brintha Rajakumari S., Nalini C., An efficient data mining dataset preparation using aggregation in relational database, Indian Journal of Science and Technology, v-7, i-, pp-44-46, 2014.
[17] Khanna V., Mohanta K., Saravanan T., Recovery of link quality degradation in wireless mesh networks, Indian Journal of Science and Technology, v-6, i-SUPPL.6, pp-4837-4843, 2013.
[18] Khanaa V., Thooyamani K.P., Udayakumar R., A secure and efficient authentication system for distributed wireless sensor network, World Applied Sciences Journal, v-29, i-14, pp-304-308, 2014.
[19] Udayakumar R., Khanaa V., Saravanan T., Saritha G., Retinal image analysis using curvelet transform and multistructure elements morphology by reconstruction, Middle - East Journal of Scientific Research, v-16, i-12, pp-1781-1785, 2013.
[20] P.R.Hariharan & Dr. K.P. Thooyamani, “ Various Schemes for Database Encryption - A Survey”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8763-8767.
[21] Sharad Kumar Verma and Dr. D.B. Ojha , A Discussion on Elliptic Curve Cryptography and Its Applications , IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 ISSN (Online): 1694-0814
[22] Victor S. Miller. Use of elliptic curves in cryptography. In H.C. Williams, editor, Advances in Cryptology CRYPTO`85, vol. 218 of Lecture Notes in Computer Science, pp. 417-426. Springer-Verlag, 1986.
[23] Whitfield Diffie and Martin E. Hellman. New directions in cryptography, IEEE Transactions on Information Theory, 22(6):644-654, 1976.
[24] Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469- 472, 1985.
[25] https://en.wikipedia.org/wiki/Elliptic-curve_cryptography
[26] William Stallings, “Cryptography and network Security: Principles and Practice”, Pearson Education/Prentice Hall, 5th Edition.