H. Mohammed Khan, Dr.J.George Chellin Chandran, C.Sahaya Kingsly


Network Security is protecting data transmitted over a    network and privacy is of utmost importance. Rapid developments in information technology makes Data Security a challenging issue of data communications in the global networked world. Vital information of offices and organizations has to be guarded from unauthorized persons who may tamper with the information. Sensitive information is exposed to threats like masquerades, corruption or denial of services [1, 2].  Secure systems need to maintain integrity and privacy of data [3]. Designing an appropriate security system to protect proprietary information requires developing a set of appropriate solutions for specific risk scenarios. One important tool to protect information is the use of cryptography for hiding contents of a message and Confidentiality of network communications. The applications of cryptography go beyond networks, business and customers. This paper suggests a new direction in using cryptography for network security.


Cryptographic Algorithm, Network Security, Communication security.


B. Figg. (2004). Cryptography and Network Security. Internet: http:/ [March 16, 2010].

A. Kahate, Cryptography and Network Security (2nd ed.). New Delhi: Tata McGraw Hill, 2008.

M. Milenkovic. Operating System: Concepts and Design, New York: McGrew-Hill, Inc., 1992.

Levy, S. (2001). Crypto: How the code rebels beat the Government – Saving privacy in the digital age. New York: Viking Penguin Publishing.

Robinson, S. (2008, June). Safe and secure: data encryption for embedded systems. EDN Europe, 53(6), 24-33.

Schneier, B. (2004, October). The Nonsecurity of Secrecy. Communications of the ACM, 47(10), 120-120.

Fagin, B., Baird, L., Humphries, J., & Schweitzer, D. (2008, January). Skepticism and Cryptography. Knowledge, Technology & Policy, 20(4), 231-242.

Floyd, D. (2006, Fall2006). Mobile application security system (MASS). Bell Labs Technical Journal, 11(3), 191-198.

Lovoshynovskiy, S., Deguillaume, F., Koval, O., & Pun, T. (2005, January). INFORMATION-THEORETIC DATA-HIDING:: RECENT ACHIEVEMENTS AND OPEN PROBLEMS. International Journal of Image & Graphics, 5(1), 5-35.

K.M. Alallayah, W.F.M. Abd El-Wahed, and A.H. Alhamani.“Attack Of Against Simplified Data Encryption Standard Cipher System Using Neural Networks”. Journal of Computer Science,2010, 6(1), pp. 29-35.

William Stallings, “Cryptography and Network Security Principles and Practices, Fourth Edition”, Prentice Hall, 2005.

B. Schneier. Applied Cryptography. John Wiley & Sons Inc., 2nd edition, 1996.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at