Cryptography and Network Security CSE Technical Seminar

The research paper Cryptography and Network Security CSE Technical Seminar speaks about Cryptography and its importance in securing the data from any foreign influence. Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet. Within the context of any application-to-application communication, there are some specific security requirements. The research abstract explains in depth all the above mentioned aspects.

The research paper explains three types of cryptographic algorithms:

Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption

Public Key Cryptography (PKC): Uses one key for encryption and another for decryption

Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information

Types of authority have been explained in the paper:

Establish identity: Associate, or bind, a public key to an individual, organization, corporate position, or other entity.

Assign authority: Establish what actions the holder may or may not take based upon this certificate.

Secure confidential information (e.g., encrypting the session’s symmetric key for data confidentiality).

Different types of threats to the network and how cryptography deals with them effectively have been mentioned in the Research abstract.


The research paper concludes on a note commenting about the effectiveness of network security. In this context it explains VPN.  A  virtual  private network ( VPN ) is a way to use a public telecommunication  infrastructure ,  such  as  the Internet ,  to  provide remote offices  or  individual users with  secure access to their organization’s network. A  virtual  private network  can  be  contrasted  with  an  expensive  system  of owned or  leased  lines  that  can  only  be  used by one organization. The goal  of  a VPN  is  to provide the organization  with  the  same  capabilities , but at a  much  lower  cost.

Download Cryptography and Network Security CSE Technical Seminar.

3 Replies to “Cryptography and Network Security CSE Technical Seminar”

Leave a Reply

Your email address will not be published. Required fields are marked *