Type a new keyword(s) and press Enter to search

Research Paper - Cryptography

 

As such, the teaching of security is still a moving target. Security courses originally focused on mathematical and algorithmic aspects such as encryption and hashing techniques. However, as crackers hacked away at networks and systems, courses arose that emphasized the latest attacks.These attacks soon became out-of-date with security software responses. As security technology continues to mature, there is an emerging set of security techniques and skills.Network security skills emphasize business practices, legal foundations, attack recognition, security architecture, and network optimization. Mohamed A. Haleem et.al [5] discussed a tradeoff between security and throughput in wireless network where Markov Decision Process and OFDM (orthogonal frequency Division Multiplexing) helped out to determine channel estimation, tracking and prediction. It also uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput. It defines mathematical models to capture the security-throughput trade-off, adversary models and their effects, joint optimization of encryption and modulation (single and multirate), the use of Forward Error Correcting (FEC) codes to protect encrypted packets from bit errors, and simulation results for Rijndael cipher. Dr. James H. Yu [6] concluded that most people do not know they are at risk until an attack occurs. The general rule is that as network security increases, cost increases, and the overall system network performance decreases. Network security consists of authentication, access control, integrity, and confidentiality. It must be addressed at three levels: (1) user-internal security policies, (2) Application – firewalls, proxies, and software, and (3) hardware – intelligent hubs, switches, and routers. A network security policy, an auditing procedure, and a violation response plan must all be in place to deal with any breach or breakdown of network security before it occurs.


Essays Related to Research Paper - Cryptography