Network Security and Methods of Encoding and Decoding

Authors

  • Sharmeen kaur Computer Science & Engineering, Punjab Technical University, India
  • Raveena Singh Computer Science & Engineering, Punjab Technical University, India
  • Shivya Gagneja Computer Science & Engineering, Punjab Technical University, India

Keywords:

Network security, Encoding, Decoding, cryptography

Abstract

Network Security is the most vital component in data protection because it is responsible for protecting all information passed through computers containing network. Network Security refers to all hardware and software functions, characteristics, features, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Here we are focusing on the technique of Quantum Cryptography which uses the law of quantum physics for unconditionally secure data communications. This is an improvement because the cryptography currently in use, known as conventional cryptography, is dependent entirely on the difficulty level of a mathematical equation. To write this paper we have studied about Network Security and methods of encoding and decoding in detail. Hereby we are presenting our work on the enhancement of cryptography using various encoding and decoding approaches. The proposed algorithm has a better speed compared with other encoding algorithm. Nevertheless, the proposed algorithm improves encoding security by inserting the symmetric layer. The proposed algorithm will be useful to the applications which require the same procedure of encoding and decoding. This paper makes a comparison between classical cryptography and quantum cryptography and outlines the increased security level provided by quantum cryptography.

References

Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE.

Simmonds, A; Sandilands, P; van Ekert, L (2004) Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285, pp.317–323.

A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco.

Dave Dietrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.

Sanchez-Avila, C. Sanchez-Reillol, R, ―The Rijndael block cipher (AES proposal): A comparison with DES‖, 35th International Conference on Security Technology 2001, IEEE.

Symmetric key cryptography using random key generator,A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July, 2010, Vol-2,P-239-244.

By Klaus Felten “An Algorithm for Symmetric Cryptography with a wide range of scalability” published by 2nd International Workshop on Embedded Systems, Internet Programming and Industrial IT.

Downloads

Published

2014-02-28

How to Cite

[1]
S. kaur, R. Singh, and S. Gagneja, “Network Security and Methods of Encoding and Decoding”, Int. J. Comp. Sci. Eng., vol. 2, no. 2, pp. 11–15, Feb. 2014.

Issue

Section

Research Article