Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Network Security and Cryptography Techniques


Affiliations
1 Department of Computer Science, Pioneer College of Arts and Science, Coimbatore – 47, India
     

   Subscribe/Renew Journal


The computer network technology is developing rapidly, and the development of internet technology is more speedily, people more aware of the significance of the network security. Network security is main issue of computing because many types of attacks are increase day by day. The wicked nodes create a problem in the network. This spiteful nodes acts as selfishness, It can use the funds of other nodes and preserve the resources of its own. After analyzing and quantifying the network in rank security elements confidentiality, reliability and convenience, this paper describes the network security secrecy vector, network safety integrity vector and network security availability vector; also we close at hand some major type of attacks in MANET.

Keywords

Symmetric Encryption, A Symmetric Encryption, Hash Algorithm, Caesar Table, Cryptography.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 199

PDF Views: 4




  • Network Security and Cryptography Techniques

Abstract Views: 199  |  PDF Views: 4

Authors

N. Valarmathy
Department of Computer Science, Pioneer College of Arts and Science, Coimbatore – 47, India
P. Vishnupriya
Department of Computer Science, Pioneer College of Arts and Science, Coimbatore – 47, India

Abstract


The computer network technology is developing rapidly, and the development of internet technology is more speedily, people more aware of the significance of the network security. Network security is main issue of computing because many types of attacks are increase day by day. The wicked nodes create a problem in the network. This spiteful nodes acts as selfishness, It can use the funds of other nodes and preserve the resources of its own. After analyzing and quantifying the network in rank security elements confidentiality, reliability and convenience, this paper describes the network security secrecy vector, network safety integrity vector and network security availability vector; also we close at hand some major type of attacks in MANET.

Keywords


Symmetric Encryption, A Symmetric Encryption, Hash Algorithm, Caesar Table, Cryptography.