ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AN ILLUSTRATIVE REVIEWS ON CRYPTOGRAPHIC ALGORITHMS USED IN NETWORKING APPLICATIONS FOR SECURITY

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.10, No. 4)

Publication Date:

Authors : ;

Page : 61-71

Keywords : Decryption; Electronic Mail Security; Encryption; RC4 Algorithm; SMTP; Cryptography.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The characteristics of network protection have evolved as a result of the exponential growth in computing applications of mobile and wireless networks. There has been an uptick in internet attacks and certain malicious activities on businesses and individual networks in recent years. Firewalls and security coding are insufficient and ineffective for defending computer networks. Personal device users, businesses, and the military have also realised the importance of network protection. The RC4-based encryption algorithmic rule is used to protect email correspondence in this article. With the introduction of the internet, protection has become a huge issue, and studying the evolution of security makes for a greater understanding of how security technologies emerged. Many networks have been developed as a result of the rapid demand for computers in businesses and other organisations. Attacks on computer networks have been even more common in recent years. As a result, certain approaches for designing new frameworks to secure wireless networks and mobile devices are needed. This paper would be extremely helpful and critical for network protection. Since our networks or edge devices may be infiltrated by a variety of assaults. We will examine various available mechanisms to defend our network in this article. People use contact mechanisms such as e-mail promotional, text messaging, SMTP, social networking, search engines, bookmarking services, partner systems, print media, and direct mail on a daily basis. This authentication intervals are controlled by the encryption and decryption techniques. The role of network protection entails not just the security of end systems but also the security of the whole network. An effort has been made in this paper to study numerous Network Security and Cryptographic principles. The current state of the art for a wide variety of cryptographic algorithms used in networking applications is discussed in this article.

Last modified: 2022-03-10 18:10:14