The research paper Cryptography and Network Security CSE Engineering Seminar Topic suggests that Today communication has always been an integral part of our existence.
- Radio communication
- Telephonic communication
- Network communication
- Mobile communication
The paper explains a fact that though all these methods and means of communication have played an important role in our lives, but in the past few years, network communication, especially over the Internet, has emerged as one of the most powerful. methods of communication with an overwhelming impact on our lives. Such rapid advances in communications technology have also given rise to security threats to individuals and organizations.
What is Security Attack: The research abstract explains two types of security attacks.
Interruption: In an attack where one or more of the systems of the organization become unusable due to attacks by unauthorized users. This leads to systems being unavailable for use.
Interception: An unauthorized individual intercepts the message content and changes it or uses it for malicious purposes. After this type of attack, the message does not remain confidential.
What is Cryptography: The research paper explains what Cryptography is. It says that the term cryptology has its origin in Greek kryptós lógos, which means “hidden word.” Cryptography is the science of protecting data, which provides means and methods of converting data into unreadable form, so that Valid User can access Information at the Destination. Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
The research paper concludes on the note that Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. This paper describes the cryptographic concepts of symmetric-key encryption, public-key encryption, types of encryption algorithms, hash algorithms, digital signatures, and key exchange.
Download Cryptography and Network Security CSE Engineering Seminar Topic.