Article Preview
Top1. Introduction
Currently, Internet has been widely used all over the world; so, unauthorized access to this network can effortlessly complicate a person’s life. To safeguard the network and data transmission via the wireless network, the NS along with cryptography is utilized. An NS relies on layers of security (perimeter layer, mission critical layer, human layer, endpoint layer, application layer, data layer, along with network layer); it also includes numerous components like network monitoring, security software, along with hardware appliances (Deshpande 2015). The responsibility of transferring data securely via the internet from one system to the other one is taken by the NS (Debar et al. 2010). It specifies all features, software and hardware functions, measures, administrative and management, accountability, access control, characteristics, operational procedures, and data in a network are in a reasonable level to safeguard software along with hardware (Kumari et al. 2017). The whole NS field is wide; also in a progressive stage. To monitor and prevent unauthorized access, alteration, abuse, denial of a computer network along with network-accessible resources, the provisions and approaches implemented by a network are included in NS. A network can be private as a company or it might be open, which is accessible to the public (Simmonds et al. 2004). To augment the computer network’s security, the entire components operate together. Cryptography is a methodology utilizing which the data can be secured. As a result, it is noticed that for NS, cryptography is highly significant, which is a developing technology. The cryptography in blockchain (BC) technology is explicated in figure 1.
Figure 1.
Cryptography in blockchain technology
Cryptography in block chain technology is depicted in figure 1. Initially, with the receivers’ public key, the sender encrypts the message; thus sender can send the encrypted message securely because the only way to view the message is to decrypt it with the related private key that only the receiver has. Then, the message is received, and by utilizing the private key, the receiver could decrypt the message.
To maintain the security of information, cryptography is utilized. non-repudiation (NR), confidentiality, secrecy, and authentication are the ‘4’ issues in NS. The process of maintaining the data’s confidentiality devoid of being accessed by unauthorized users is termed as secrecy. Authentication is a must to maintain the information highly sensitive. The signature is handled by NR. The secure connection betwixt sender and receiver is made certain by utilizing message integrity (Tayal et al. 2017). The procedure of writing secret code is mentioned as cryptography. ATM cards, computer passwords, business applications, and e-commerce are some of the applications included in cryptography. Cryptography is directly associated with cryptology along with cryptanalysis. In cryptography, ‘2’ technologies are utilized. On the sender side, encryption (The process of protecting data by encoding it mathematically, like it could only be read or decrypted, by those with the exact cipher or key is referred to as Encryption.) is utilized; similarly, on the receiver side, decryption (Decryption is the process of conversion of encrypted data into its actual form . It is usually encryption's reverse process.) is utilized (Panda et al. 2014). Following are some of the challenges included in cryptography (Menezes and Stebila 2014),