Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology

Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology

Anjana S. Chandran
Copyright: © 2022 |Pages: 18
DOI: 10.4018/IJISP.308306
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A huge amount of data has been generated every day across the world by organizations with the emergence of the World Wide Web, social networks, along with e-commerce applications. To safeguard the network along with data transmission that occurs over a wireless network, cryptography along with network security (NS) is utilized. In data transmission over a wireless untrustworthy network, securing data is a major concern. Providing security to the wireless sensor networks is highly significant; NS provides security not only to the end system but also to all over the network system. Consequently, NS, cryptography, present progress in NS, linear cryptanalysis (LC), together with differential cryptanalysis (DC) are explicated in this work. The outcomes of the encryption time (ET) versus file size for data encryption standard (DES), advanced encryption standard (AES), 3DES, Rivest-Shamir-Adleman (RSA), blowfish, and the decryption time (DT) versus file size for RSA, AES, modified RSA (MRSA), and nth degree truncated polynomial ring units (NTRU) are also evaluated in this paper.
Article Preview
Top

1. Introduction

Currently, Internet has been widely used all over the world; so, unauthorized access to this network can effortlessly complicate a person’s life. To safeguard the network and data transmission via the wireless network, the NS along with cryptography is utilized. An NS relies on layers of security (perimeter layer, mission critical layer, human layer, endpoint layer, application layer, data layer, along with network layer); it also includes numerous components like network monitoring, security software, along with hardware appliances (Deshpande 2015). The responsibility of transferring data securely via the internet from one system to the other one is taken by the NS (Debar et al. 2010). It specifies all features, software and hardware functions, measures, administrative and management, accountability, access control, characteristics, operational procedures, and data in a network are in a reasonable level to safeguard software along with hardware (Kumari et al. 2017). The whole NS field is wide; also in a progressive stage. To monitor and prevent unauthorized access, alteration, abuse, denial of a computer network along with network-accessible resources, the provisions and approaches implemented by a network are included in NS. A network can be private as a company or it might be open, which is accessible to the public (Simmonds et al. 2004). To augment the computer network’s security, the entire components operate together. Cryptography is a methodology utilizing which the data can be secured. As a result, it is noticed that for NS, cryptography is highly significant, which is a developing technology. The cryptography in blockchain (BC) technology is explicated in figure 1.

Figure 1.

Cryptography in blockchain technology

IJISP.308306.f01

Cryptography in block chain technology is depicted in figure 1. Initially, with the receivers’ public key, the sender encrypts the message; thus sender can send the encrypted message securely because the only way to view the message is to decrypt it with the related private key that only the receiver has. Then, the message is received, and by utilizing the private key, the receiver could decrypt the message.

To maintain the security of information, cryptography is utilized. non-repudiation (NR), confidentiality, secrecy, and authentication are the ‘4’ issues in NS. The process of maintaining the data’s confidentiality devoid of being accessed by unauthorized users is termed as secrecy. Authentication is a must to maintain the information highly sensitive. The signature is handled by NR. The secure connection betwixt sender and receiver is made certain by utilizing message integrity (Tayal et al. 2017). The procedure of writing secret code is mentioned as cryptography. ATM cards, computer passwords, business applications, and e-commerce are some of the applications included in cryptography. Cryptography is directly associated with cryptology along with cryptanalysis. In cryptography, ‘2’ technologies are utilized. On the sender side, encryption (The process of protecting data by encoding it mathematically, like it could only be read or decrypted, by those with the exact cipher or key is referred to as Encryption.) is utilized; similarly, on the receiver side, decryption (Decryption is the process of conversion of encrypted data into its actual form . It is usually encryption's reverse process.) is utilized (Panda et al. 2014). Following are some of the challenges included in cryptography (Menezes and Stebila 2014),

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing