The cryptography by identifying the different cryptographic algorithms in the sequence of their temporal existence and importance

Authors

  • MSc Waseem Saad Nsaif College of physical education and sport science - Diyala University- Iraq Author
  • MSc. Wisam Mahdi Abas Presidency of the University of Diyala, Diyala University, Iraq Author
  • MSc. Abdullah Farhan College of Agriculture, Diyala University, Iraq Author

DOI:

https://doi.org/10.61841/tykw8286

Keywords:

cryptography, algorithms, network security

Abstract

This research consists of basic concepts and principles of cryptography, then it moves to identify the different cryptographic algorithms in the sequence of their temporal existence and importance, to begin with, traditional cryptographic algorithms, then it turns to the corresponding cryptographic algorithms where it discusses a number of algorithms including DES, AES, Triple DES, and others. Then proceeds to identify cryptographic algorithms using the public key, and also discusses a number of them such as RSA and ECC. Although the list presented previously does not cover at all the possible possibilities for network penetration, it does clarify the area of network security concerns. Network security is complicated by some fun. Here are some of the reasons for this observation: 1- Issues of achieving security related to networks and communications are not as simple as they seem to newcomers to this field. The requirements appear quite clear, and indeed, most of the basic requirements for security are evident through their names: confidentiality, identity verification, refusal to recognize, perfectionism. However, the mechanisms used to achieve these requirements can be very complex, and their understanding may require solid logic. 2- When a person develops a protection mechanism or algorithm, he must consider all possible types of attack on his system. Often times, the resulting attack is based on a different view of protection, allowing for the exploitation of unexpected vulnerabilities in protection mechanisms. 3- In light of the previous item, we see that the procedures used to provide a service are often unclear and intuitive. At first glance, it is not clear that these measures are necessary to fulfill the security requirement for which they were set. However, the picture becomes clear after all the procedures and possibilities for breaching the established security requirement have been studied. 4- When designing the various mechanisms to achieve security, a decision must be made about where to use these mechanisms, from two perspectives: physical, that is, what are the network points that need this mechanism. Boolean, i.e. in which layer or layers should this mechanism be used. 5- Most protection mechanisms include more than one algorithm or one protocol. Most subscribers must possess some confidential information (for example cryptographic keys), which leads to questions about how this information is generated, distributed, and protected. In addition, there is a reliance on communication protocols, which sometimes complicate the development of the protection mechanism. For example, if the correct work of one of the protection mechanisms assumes that there are time limits for the transmission of the message from the sender to the receiver, then any protocol or network that offers the ability to change this time interval will make the limits imposed by the protection agent a meaningless amount, and thus the mechanism will lose Protection takes effect. We see from the above that there are many things that must be taken into consideration. This chapter provides an overview of the topics on which this thesis will be built. A general discussion will begin with network security services and mechanisms, and potential attack types that have been identified. For these mechanisms. The overall model is then developed to review network security mechanisms and services.

Downloads

Download data is not yet available.

References

1. Dr. P. K. Deshmukh, Mrs. V. R. Desale, Prof. R. A. Deshmukh, “Investigation of TPA (Third Party Auditor Role) foe Cloud Data Security”, International Journal of Scientific and Engineering Research, vo. 4,no. 2,ISSn 2229-5518, Feb 2013.

2. T. Good and M. Benaissa, “Hardware performance of eStream phase-III stream cipher candidates,” the State of the Art of Stream Ciphers Workshop (SASC’08), Lausanne, Switzerland, Feb. 13-14, 2008.

3. D. Hwang, M. Chaney, S. Karanam, N. Ton, and K. Gaj, “Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates,” the State of the Art of Stream Ciphers Workshop (SASC’08), Lausanne, Switzerland, Feb. 13-14, 2008.

4. Atallah M J, Blanton M, Fazio N, 2009, Frikken KB, “Dynamic and efficient key management for access hierarchies” ACM Transactions on Information and System Security, pp.18:1–43.

5. D. Shrinivas, “Privacy-Preserving Public Auditing in Cloud Storage security”, International Journal of computer science and Information Technologies, vol 2, no. 6, pp. 2691-2693, ISSN: 0975-9646, 2011.

6. Wallner D, Harder E.Agee, 1999, “Rfc2627:key management for multicast:issues and architectures”, pp56.

7. Wong CK, Gouda M, Lam SS, 1998, “Secure group communications sing key graphs”In: Proceedings of theACM SIGCOMM’98 conference on applications, technologies, architectures, and protocols for computer communication, pp.68–79.

8. C wang, Sherman S. M. Chow, Q. Wang, K Ren and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”,IEEETrasaction on Computers I, vol. 62, no. 2, pp.362- 375 , February 2013.

Downloads

Published

03.08.2020

How to Cite

MSc Waseem Saad Nsaif, MSc. Wisam Mahdi Abas, & MSc. Abdullah Farhan. (2020). The cryptography by identifying the different cryptographic algorithms in the sequence of their temporal existence and importance . International Journal of Psychosocial Rehabilitation, 24(10), 4107-4120. https://doi.org/10.61841/tykw8286