The research paper Cryptography and Network Security CSE Technical Seminar speaks about Cryptography and its importance in securing the data from any foreign influence. Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet. Within the context of any application-to-application communication, there are some specific security requirements. The research abstract explains in depth all the above mentioned aspects.
The research paper explains three types of cryptographic algorithms:
Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information
Types of authority have been explained in the paper:
Establish identity: Associate, or bind, a public key to an individual, organization, corporate position, or other entity.
Assign authority: Establish what actions the holder may or may not take based upon this certificate.
Secure confidential information (e.g., encrypting the session’s symmetric key for data confidentiality).
Different types of threats to the network and how cryptography deals with them effectively have been mentioned in the Research abstract.
The research paper concludes on a note commenting about the effectiveness of network security. In this context it explains VPN. A virtual private network ( VPN ) is a way to use a public telecommunication infrastructure , such as the Internet , to provide remote offices or individual users with secure access to their organization’s network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities , but at a much lower cost.
Download Cryptography and Network Security CSE Technical Seminar.