1. Authenticating Cryptography over Network in Data
- Author
-
Bharti Sharma, Priya Agarwal, Ashutosh Kumar Singh, Ishu Gupta, Ankit Tiwari, and Sloni Mittal
- Subjects
Authentication ,Network security ,business.industry ,Wireless network ,Computer science ,Data security ,020206 networking & telecommunications ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,01 natural sciences ,Public-key cryptography ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Message authentication code ,business ,computer - Abstract
The instantaneous growth for the world being digital is- "Expeditious growth of a network system and high-speed internet". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.
- Published
- 2019
- Full Text
- View/download PDF