The Security Challenges Of Cryptography And Network Security

1648 Words4 Pages

This chapter provides an overview of cryptography concept. It`s required to encrypt and maintain confidentiality of the information to be transmitted over the network. This is achieved through cryptography. Cryptography plays a vital role in securing the information when transmitted across the network. It helps in maintaining the integrity of the information stored on the network. Thus, security is one of the important concepts to be explored in the world of network security.
Some of the security challenges that we commonly face are: maintaining integrity and confidentiality of the information, encrypting the information and sharing of information. To address these challenges, it is very important for you to explore cryptography concepts …show more content…

The process of cryptology involves converting an actual message into an encrypted format using a secret key, which is shared between the source and destination.
The concept cryptography has been adopted in the organisations to:
a. Secure information that is been transmitted across the network
b. Maintain integrity of the information on the network
c. Convert the message into an unreadable format
d. Support many security activities on the network such as, data hiding/encapsulation, and steganography.
Let us understand the process of cryptography with the help of an example given below. Figure 3.1.1: Cryptography Overview
As per Figure 3.1.1, Alice and Bob are communicating with each other. The communication happens between Alice and Bob through a secured channel using the process of cryptography. This process converts the original plain text to an unknown text such as ciphertext, which helps to protect the information through the secured channel.
Cryptography concept is based on two important entities:
i. Plain Text
ii. …show more content…

The sender uses session key to encrypt the message using its public key. Receiver decrypts the message using share session key with the help of destination`s private key. During this process the sender and receiver ensures that the message is maintained confidential during the transmission on the network.
Alice wants to send the information to Bob through the secured channel. The information transmitted from Alice to Bob is maintained confidential till it reaches the destination.
For example:
1. When managers shares some confidential information with their subordinates or colleagues in the office, the employees should ensure that the information shared by their managers are kept confidential and is not leaked outside the organisation.
2. The information stored in the federal agency websites or server is treated to be highly confidential, as it contains various data related to government business.

b. Integrity
The information transmitted between sources to the destination is maintained confidentially. The protocol that governs the confidentiality of information from source to destination is called

More about The Security Challenges Of Cryptography And Network Security

Open Document