The cryptography by identifying the different cryptographic algorithms in the sequence of their temporal existence and importance
DOI:
https://doi.org/10.61841/tykw8286Keywords:
cryptography, algorithms, network securityAbstract
This research consists of basic concepts and principles of cryptography, then it moves to identify the different cryptographic algorithms in the sequence of their temporal existence and importance, to begin with, traditional cryptographic algorithms, then it turns to the corresponding cryptographic algorithms where it discusses a number of algorithms including DES, AES, Triple DES, and others. Then proceeds to identify cryptographic algorithms using the public key, and also discusses a number of them such as RSA and ECC. Although the list presented previously does not cover at all the possible possibilities for network penetration, it does clarify the area of network security concerns. Network security is complicated by some fun. Here are some of the reasons for this observation: 1- Issues of achieving security related to networks and communications are not as simple as they seem to newcomers to this field. The requirements appear quite clear, and indeed, most of the basic requirements for security are evident through their names: confidentiality, identity verification, refusal to recognize, perfectionism. However, the mechanisms used to achieve these requirements can be very complex, and their understanding may require solid logic. 2- When a person develops a protection mechanism or algorithm, he must consider all possible types of attack on his system. Often times, the resulting attack is based on a different view of protection, allowing for the exploitation of unexpected vulnerabilities in protection mechanisms. 3- In light of the previous item, we see that the procedures used to provide a service are often unclear and intuitive. At first glance, it is not clear that these measures are necessary to fulfill the security requirement for which they were set. However, the picture becomes clear after all the procedures and possibilities for breaching the established security requirement have been studied. 4- When designing the various mechanisms to achieve security, a decision must be made about where to use these mechanisms, from two perspectives: physical, that is, what are the network points that need this mechanism. Boolean, i.e. in which layer or layers should this mechanism be used. 5- Most protection mechanisms include more than one algorithm or one protocol. Most subscribers must possess some confidential information (for example cryptographic keys), which leads to questions about how this information is generated, distributed, and protected. In addition, there is a reliance on communication protocols, which sometimes complicate the development of the protection mechanism. For example, if the correct work of one of the protection mechanisms assumes that there are time limits for the transmission of the message from the sender to the receiver, then any protocol or network that offers the ability to change this time interval will make the limits imposed by the protection agent a meaningless amount, and thus the mechanism will lose Protection takes effect. We see from the above that there are many things that must be taken into consideration. This chapter provides an overview of the topics on which this thesis will be built. A general discussion will begin with network security services and mechanisms, and potential attack types that have been identified. For these mechanisms. The overall model is then developed to review network security mechanisms and services.
Downloads
References
1. Dr. P. K. Deshmukh, Mrs. V. R. Desale, Prof. R. A. Deshmukh, “Investigation of TPA (Third Party Auditor Role) foe Cloud Data Security”, International Journal of Scientific and Engineering Research, vo. 4,no. 2,ISSn 2229-5518, Feb 2013.
2. T. Good and M. Benaissa, “Hardware performance of eStream phase-III stream cipher candidates,” the State of the Art of Stream Ciphers Workshop (SASC’08), Lausanne, Switzerland, Feb. 13-14, 2008.
3. D. Hwang, M. Chaney, S. Karanam, N. Ton, and K. Gaj, “Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates,” the State of the Art of Stream Ciphers Workshop (SASC’08), Lausanne, Switzerland, Feb. 13-14, 2008.
4. Atallah M J, Blanton M, Fazio N, 2009, Frikken KB, “Dynamic and efficient key management for access hierarchies” ACM Transactions on Information and System Security, pp.18:1–43.
5. D. Shrinivas, “Privacy-Preserving Public Auditing in Cloud Storage security”, International Journal of computer science and Information Technologies, vol 2, no. 6, pp. 2691-2693, ISSN: 0975-9646, 2011.
6. Wallner D, Harder E.Agee, 1999, “Rfc2627:key management for multicast:issues and architectures”, pp56.
7. Wong CK, Gouda M, Lam SS, 1998, “Secure group communications sing key graphs”In: Proceedings of theACM SIGCOMM’98 conference on applications, technologies, architectures, and protocols for computer communication, pp.68–79.
8. C wang, Sherman S. M. Chow, Q. Wang, K Ren and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”,IEEETrasaction on Computers I, vol. 62, no. 2, pp.362- 375 , February 2013.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
