Nowadays, “SECURITY” become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. As citizens are using network for banking, shopping, filing their tax returns and other purposes, network security is looming on the horizon as a potentially massive problem.
Data security involves not only protection, but also detecting offends of secured communication and attacks on the infrastructure, and then responding to these attacks. The main problems that occurred in network security are secrecy, authentication, non-repudiation and integrity control.
This paper discusses with a perspective view of how a continuous cycle of protection, detection and response can be consistently maintained. Also concerns about different types of security attacks such as spoofing, virus, worm and security mechanisms such as firewalls, cryptography and describes about how security provided in mobile networks.
Cryptography is defined as information hiding. Cryptography allows two parties to exchange sensitive information in a secure manner. Cryptography has naturally been extended into the realm of computers such as secure access to private networks, electronic commerce, and health care, and provides a solution to the electronic security and privacy issue.
This paper mainly concerns about two types of cryptographic standards such as symmetric and asymmetric algorithms and also the specification and implementation of above methods. And also explained Encryption and Decryption Methods, Digital Signatures, Authentication and Keys. The implementation of public key cryptography requires several supporting components to handle key creation, distribution and revocation –Public Key Infrastructure (PKI).While the implementation of private key cryptography requires encryption and decryption methods which are also specified. Today’s new cryptography systemadvanced elliptic curve technology in smartcard technology are also specified.
No comments:
Post a Comment