Security Enhancement through Cryptography and Hardware Devices
Keywords:
Cryptography, Cybersecurity, Network Security, Hardware securityAbstract
Security is being a hot topic in present digital era. The growing usage of technology for communication generates data which is available everywhere but data security is the important issue which draws the attention of all. Cryptography and security is a notion to secure the network and information transmission through wireless network. With ever progression in digital system security has been appeared as a major concern. In this era of virus and hackers of electronic bugs and electronic fraud security is primary. The concept of hardware security has been normally related with the cybersecurity and cryptography. Cyber-attacks are usually more due to lots of users connected to the internet. The basic issues in guarding the safe transmission of data through the web are concern of the security. This paper emphasizes on the key concepts of cryptography and security on critical infrastructure devices to overcome the threats of computer network security.
References
[1] Shyam Nandan kumar,” Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol.3, No.1,1- 11.
[2] Jim Attridge, “An Overview of Hardware Security Modules” Version 1.2 of GSEC Practical Assignment for GIAC Certification, January 14, 2002.
[3] Yier Jin, “Introduction to Hardware Security”, Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA.|13 October 2015
[4] Dr Sandeep Tayal, Dr Nipin Gupta, Dr Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, ISSN 0973-6107 Volume 10, Number 5, 2017.
[5] Sarita Kumari,”A research paper on cryptography Encryption and compression Techniques”, International Journal Of Engineering And Computer Science, ISSN:2319-7242 Volume 6,4 April 2017.
[6] Shivangi Goyal,”A Survey on the Applications of Cryptography”, International Journal of Engineering and Technology Volume 2 No. 3, March, 2012.
[7] Banga, M., Hsiao, M. VITAMIN,” Voltage Inversion Technique to Ascertain Malicious Insertion in ICs”, In proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA, USA, 27-27 July 2009, pp. 104-107.
[8] Love E. Jin, Makris Y,” Proof-Carrying Hardware Intellectual property: A Pathway to Trusted Module Acquisition”, IEEE Trans. Inf. Forensics Secure, 2012, 7, 25-40.
[9] Chakraborty R, Wolff F Paul, S Papachristou, C Bhunia, S. MERO, “A Statistical Approach for Hardware Trojan Detection”, In Cryptographic Hardware and Embedded Systems” CHES 2009, Springer: Berlin, Germany; Heidelberg, Germany, 2009, Volume 5747, pp. 396–410.
[10] Bloom G, Simha R, Narahari B, “OS Support for Detecting Trojan Circuit Attacks”, In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009, pp. 100–103.
[11] Banerjee, S.K. Pandey, “Research on software security awareness: problems and prospects”, ACM SIGSOFT Software Engineering 35(5):1-5 October 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Devi AT, Majjigi TS

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
