Description: The research paper Cryptography and Network Security Seminar Project talks about the indispensable help of the domain Cryptography in providing Network Security. The research abstract suggests that Network security is a complicated subject, it can be understood and tackled by well-trained and experienced experts. However, as more and more people become connected through a network, an increasing number of people need to understand the basics of security in a networked world. When we talk about Network Security we need to keep in mind the information systems manager and the user.
It has been suggested in the paper that in data and telecommunications, cryptography is necessary when sharing information over untrusted medium, which includes flow of information along a medium, the Internet precisely speaking.
The research paper explains three types of Cryptographic Functions. They are Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information
What are trust models:
The research paper explains trust models thus: Secure use of cryptography requires trust. While secret key cryptography can ensure message confidentiality and hash codes can ensure integrity, none of this works without trust. In SKC, PKC solved the secret distribution problem. There are a number of trust models employed by various cryptographic schemes.
- The web of trust employed by Pretty Good Privacy (PGP) users, who hold their own set of trusted public keys.
- Kerberos, a secret key distribution scheme using a trusted third party.
- Certificates, which allow a set of trusted third parties to authenticate each other and, by implication, each others users.
It is understood from the research paper that scheme differs in complexity, general applicability, scope, and scalability.
Conclusion: The research paper concludes by talking about AAA server. It suggests that AAA (authentication, authorization and accounting)
servers are used for more secure access in a remote-access VPN environment . When a request to establish a session comes in from a dial up client , the Request is proxies to the AAA server . AAA then checks the following:
- Who you are (authentication)
- What you are allowed to do (authorization)
What you actually do (accounting)
Download Cryptography and Network Security Seminar Project.