AN ILLUSTRATIVE REVIEWS ON CRYPTOGRAPHIC ALGORITHMS USED IN NETWORKING APPLICATIONS FOR SECURITY
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.10, No. 4)Publication Date: 2019-08-15
Authors : M. Kannan K. R. Sathish Kumar T. Rajalakshmi;
Page : 61-71
Keywords : Decryption; Electronic Mail Security; Encryption; RC4 Algorithm; SMTP; Cryptography.;
Abstract
The characteristics of network protection have evolved as a result of the exponential growth in computing applications of mobile and wireless networks. There has been an uptick in internet attacks and certain malicious activities on businesses and individual networks in recent years. Firewalls and security coding are insufficient and ineffective for defending computer networks. Personal device users, businesses, and the military have also realised the importance of network protection. The RC4-based encryption algorithmic rule is used to protect email correspondence in this article. With the introduction of the internet, protection has become a huge issue, and studying the evolution of security makes for a greater understanding of how security technologies emerged. Many networks have been developed as a result of the rapid demand for computers in businesses and other organisations. Attacks on computer networks have been even more common in recent years. As a result, certain approaches for designing new frameworks to secure wireless networks and mobile devices are needed. This paper would be extremely helpful and critical for network protection. Since our networks or edge devices may be infiltrated by a variety of assaults. We will examine various available mechanisms to defend our network in this article. People use contact mechanisms such as e-mail promotional, text messaging, SMTP, social networking, search engines, bookmarking services, partner systems, print media, and direct mail on a daily basis. This authentication intervals are controlled by the encryption and decryption techniques. The role of network protection entails not just the security of end systems but also the security of the whole network. An effort has been made in this paper to study numerous Network Security and Cryptographic principles. The current state of the art for a wide variety of cryptographic algorithms used in networking applications is discussed in this article.
Other Latest Articles
- COMPUTATIONAL POLLUTANT OF SO2/NO2 IN THE ENVIRONMENT USING AERMOD IN SEMI-URBAN AREA, STUDI CASE IN TUBAN, EAST JAVA
- MELANOMA SKIN CANCER DETECTION USING A COMPUTER-ASSISTED APPROACH THROUGH ARTIFICIAL NEURAL NETWORK AND IMAGE PROCESSING
- RESIDUAL ATRIAL SEPTAL DEFECT AFTER PERCUTANEOUS CLOSURE: WHAT THERAPEUTIC ATTITUDE FOR THIS RARE COMPLICATION
- THE EMERGENCE OF ARTIFICIAL INTELLIGENCE IN HEALTHCARE PARADIGM A HOLISTIC STUDY
- AN OPTIMIZED METHOD FOR VEHICLE PARKING SYSTEM BASED ON IOT
Last modified: 2022-03-10 18:10:14