CRYPTOGRAPHY: A TECHNIQUE TO MAINTAIN NETWORK SECURITY

GAJANAN D. KURUNDKAR1*, SANTOSH D. KHAMITKAR2*, NITIN A. NAIK3*
1Department of Computer Science S.G.B. College, Purna
2Director, School of Computational Sciences S.R.T.M.University, Nanded
3Department of Computer Science and IT, Yeshwant College, Nanded
* Corresponding Author : nitinnaik@live.com

Received : -     Accepted : -     Published : 01-11-2011
Volume : 1     Issue : 1       Pages : 1 - 5
Int J Cryptography Secur 1.1 (2011):1-5

Conflict of Interest : None declared

Cite - MLA : GAJANAN D. KURUNDKAR, et al "CRYPTOGRAPHY: A TECHNIQUE TO MAINTAIN NETWORK SECURITY." International Journal of Cryptography and Security 1.1 (2011):1-5.

Cite - APA : GAJANAN D. KURUNDKAR, SANTOSH D. KHAMITKAR , NITIN A. NAIK (2011). CRYPTOGRAPHY: A TECHNIQUE TO MAINTAIN NETWORK SECURITY. International Journal of Cryptography and Security, 1 (1), 1-5.

Cite - Chicago : GAJANAN D. KURUNDKAR, SANTOSH D. KHAMITKAR , and NITIN A. NAIK "CRYPTOGRAPHY: A TECHNIQUE TO MAINTAIN NETWORK SECURITY." International Journal of Cryptography and Security 1, no. 1 (2011):1-5.

Copyright : © 2011, GAJANAN D. KURUNDKAR, et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Cryptography is the science of writing in secret code. In data and telecommunications, cryptography is necessary when communicating over any entrusted medium, which includes just about any network, particularly the Internet. Cryptography, then, not only protects data from theft or alteration, but it can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public key (or asymmetric) cryptography, and hash functions, in all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext. Before we talk about network security, we need to understand in general terms what security is. Security is a continuous process of protecting an object from attack. Due to heavy use of network based systems now days it is necessary to maintain our computer secured from external threats such as hackers or crackers. Computer attacks are now routine. Security involves the security of all its resources such as its physical and logical. Security means preventing unauthorized access, use, alteration, and theft or physical damage to these resources. This paper identifies security issues for Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse.

References

[1] What is Web 2.0? Ideas, technologies and implications for education by Paul Anderson,http://www.jisc.ac.uk/media/ documents/techwatch/tsw0701b.pdf  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] http://en.wikipedia.org/wiki/Web_2.0.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Anderson, Paul. 2007. What is Web2.0? Ideas, technologies and implications for education. JISC reports. http://www.jisc.ac.uk/media/documents/techwatch/ tsw0701b.pdf  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Graeme, Daniel (2006b). Web 2.0 and Education. At Wwwtools for Education. http://magazines.fasfind.com/wwwtools/magazines.cfm?rid=275 6  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Web 2.0 and New Learning Paradigms By: Antonio Bartolomé ( University of Barcelona )  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Business Models for the Next Generation of Software. O'Reilly Network  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus