
Algorithms Used in Cryptography and Role of Cryptography in Network Security
Author(s) -
M. Murugesan,
M. Jawahar,
Manoj Parameswaran
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d1119.1284s219
Subject(s) - cryptography , computer science , encryption , computer security , id based cryptography , key (lock) , neural cryptography , network security , public key cryptography , computer network , key distribution
In this modern world, we cannot live without these two things. One is technology and other one is security. Even these two cannot stand alone, they depend on each other. Technology without security and security without technology leads the world into destroying path. Day by day the technology is improving and also the security. In the technology field, the network plays an important role. Every system in the world depends on the network. So the network has been secured before it sends to the relevant people. By this problem can lead us to create a new method called Cryptography. The work of cryptography is to convert the sending message into encryption method by using some key and the receiver receives the encrypted message. The receiver decrypt the message by the key which is used to encrypt the message. In this paper, we discuss how network security works with cryptography and algorithm used for cryptography.