International Transaction of Electrical and Computer Engineers System
ISSN (Print): 2373-1273 ISSN (Online): 2373-1281 Website: Editor-in-chief: Dr. Pushpendra Singh, Dr. Rajkumar Rajasekaran
Open Access
Journal Browser
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11
DOI: 10.12691/iteces-3-1-1
Open AccessResearch Article

Review on Network Security and Cryptography

Shyam Nandan Kumar1,

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India

Pub. Date: March 17, 2015
(This article belongs to the Special Issue Special issue on Cryptography & Network Security)

Cite this paper:
Shyam Nandan Kumar. Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):1-11. doi: 10.12691/iteces-3-1-1


With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-criminals. It comprises authorization of access to information in a network, controlled by the network administrator. The task of network security not only requires ensuring the security of end systems but of the entire network. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.

network security cryptography decryption encryption

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


[1]  Shyam Nandan Kumar, “Technique for Security of Multimedia using Neural Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02, Issue: 05, pp.1-7. Sep-2014
[2]  Simmonds, A; Sandilands, P; van Ekert, L (2004). “An Ontology for Network Security Attacks”. Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317-323.
[3]  Bellare, Mihir; Rogaway, Phillip (21 September 2005). “Introduction. Introduction to Modern Cryptography. p. 10.
[4]  Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. “A. Handbook of Applied Cryptography”. ISBN 0-8493-8523-7.
[5]  Davis, R., “The Data Encryption Standard in Perspective, Proceeding of Communication Society magazine, IEEE, Volume 16 No 6, pp. 5-6, Nov. 1978.
[6]  S. NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May 2004.
[7]  Daemen, J., and Rijmen, V. “Rijndael: AES-The Advanced Encryption Standard, Springer, Heidelberg, March 2001.
[8]  FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26, 2001.
[9]  Bruce Schneier (1993). “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). Fast Software Encryption, Cambridge Security Workshop Proceedings (Springer-Verlag): 191-204.
[10]  Schneier, Bruce (2005-11-23). “Twofish Cryptanalysis Rumors. Schneier on Security blog. Retrieved 2013-01-14.
[11]  Matsui, Mitsuru; Tokita, Toshio (Dec 2000). “MISTY, KASUMI and Camellia Cipher Algorithm Development. Mitsibishi Electric Advance (Mitsibishi Electric corp.) 100: 2-8. ISSN 1345-3041.
[12]  General Report on the Design, Speification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms”. 3GPP. 2009
[13]  O. Dunkelman, N. Keller, A. Shamir, \A practical-time attack on the KASUMI cryptosystem used in GSM and 3G telephony, Advances in Cryptology, Proceedings Crypto'10, LNCS, T. Rabin, Ed., Springer, Heidelberg, 2010
[14]  R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.
[15]  Diffie, W.; Hellman, M. (1976). “New directions in cryptography. IEEE Transactions on Information Theory 22 (6): 644-654.
[16]  Koblitz, N., 1987. “Elliptic curve cryptosystems. Mathematics of Computation” 48, 203-209.
[17]  Miller, V., 1985. “Use of elliptic curves in cryptography”. CRYPTO 85.
[18]  FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, NIST, U.S. Dept. of Commerce, May 11, 1993.
[19]  M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schla er, \Rebound distinguishers: results on the full Whirlpool compression function, Advances in Cryptology, Proceedings Asiacrypt'09, LNCS 5912, M. Matsui, Ed., Springer, Heidelberg, 2009, pp. 126-143.
[20]  Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). “Keying Hash Functions for Message Authentication”.
[21]  NIST Special Publication 800-38B, “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005.