Cryptography and Network Security Seminar Project

Description: The research paper Cryptography and Network Security Seminar Project talks about the indispensable help of the domain Cryptography in providing Network Security. The research abstract suggests that Network security is a complicated subject, it can be understood and tackled by well-trained and experienced experts. However, as more and more people become connected through a network, an increasing number of people need to understand the basics of security in a networked world. When we talk about Network Security we need to keep in mind the information systems manager and the user.

It has been suggested in the paper that in data and telecommunications, cryptography is necessary when sharing information over untrusted medium, which includes flow of information along a medium, the Internet precisely speaking.

The research paper explains three types of Cryptographic Functions. They are Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption

Public Key Cryptography (PKC): Uses one key for encryption and another for decryption

Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information

What are trust models:

The research paper explains trust models thus: Secure use of cryptography requires trust. While secret key cryptography can ensure message confidentiality and hash codes can ensure integrity, none of this works without trust. In SKC, PKC solved the secret distribution problem. There are a number of trust models employed by various cryptographic schemes.

  • The web of trust employed by Pretty Good Privacy (PGP) users, who hold their own set of trusted public keys.
  • Kerberos, a secret key distribution scheme using a trusted third party.
  • Certificates, which allow a set of trusted third parties to authenticate each other and, by implication, each others users.

It is understood from the research paper that scheme differs in complexity, general applicability, scope, and scalability. 

Conclusion: The research paper concludes by talking about AAA server. It suggests that AAA (authentication, authorization and accounting)    

servers are  used  for  more  secure  access  in  a  remote-access  VPN environment . When  a  request  to  establish  a session  comes  in from a dial up  client ,  the   Request  is  proxies   to  the   AAA  server .  AAA then checks the following:

  • Who you are (authentication)
  • What you are allowed to do (authorization)

What you actually do (accounting)

Download Cryptography and Network Security Seminar Project.

Leave a Reply

Your email address will not be published. Required fields are marked *