Sunteți pe pagina 1din 6

IPASJ International Journal of Information Technology (IIJIT)

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Study on Security Issues in Computer Networks


and Encryption Techniques
R.Srinivasan1, V. Saravanan2 and M. Nagarajan3
1

Professor & Head, IT Department, PSV College of Engineering and Technology, Krishnagiri.

Assistant Professor, IT Department, PSV College of Engineering and Technology, Krishnagiri.


3

PG Scholar, IT Department, PSV College of Engineering and Technology, Krishnagiri

ABSTRACT
The problem of network attacks increases everyday as the number of network users and nodes gets increased. IT security
personnel and network engineers who are managing a very large networks finds solution to the common problems in Computer
Networks. The important issues that affect the Computer Networks are Performance Degradation, Host Identification and
Security Issues. In this paper we have discussed in detail about various security related issues in computer networks and
information security. Also, we have focused on how the current security schemes and encryption algorithms are not suitable for
the future needs and the necessity for developing new security mechanisms.

Keywords:- Network Security, Information Security, Cryptography, Limitations of cryptography.

1. INTRODUCTION
A computer network or a data network is an information transfer network that permits computers to trade data [1]. In
computer networks the networked registering gadgets trades the data to one another along data associations. The
associations i.e., network lines between hubs are created utilizing two medias that is Cable media and Wireless media.
Web is the best known computer network [2]. IT security work force and network engineers who are dealing with huge
networks discover arrangement extremely odd to the regular issues in Computer Network. The fundamental issues that
influencing the Computer Networks are Performance Degradation, Host Identification and Security Issues
1.1 Performance Degradation
Execution debasement implies the issues identified with the loss of velocity and data trustworthiness because of poor
transmissions. Every last network is inclined to execution issues. Particularly substantial networks are vulnerable
because of the extra separation, endpoints, and extra gear at midpoints. Answers for execution corruption are
exceptionally troublesome. To build the execution of the networks we have to buy the best quality computer networking
fittings with a reasonable cost. Next is to assemble the establishment of great network equipment. At last network
execution ought to be on a par with the parts of which it is created. Quality is likewise an essential variable that ought
to be thought seriously about. Since quality in Networks without enough switches, switches, area controllers, and so on
is unrealistic to acquire the execution of the Network [4]. Great quality equipment ought to be there however that is not
just enough there ought to likewise be a legitimate design of the fittings. It is essential to guarantee that all computers
and network "pipes" are appropriately associated with a quality link and arranged legitimately it likewise incorporates
confirming network settings in server and desktop network arrangement applications and additionally checking settings
in the firmware of networking parts (switches, switches, firewalls, and so forth.). Each gadget joined on the network
ought to be at first and routinely checked for issues, as rebel PCs contaminated with infections, spyware, bootware can
squander bandwidth and even in most detrimental possibility can taint different frameworks.
1.2 Host Identification
Fitting arrangement is vital to keeping up legitimate host ID. Generally as the mail station can't convey a letter without
legitimate location the same with Computer Network [3]. With the little networks the arrangement can be effectively
finished with manual tending to yet this gets to be totally unrealistic in extensive networks. Thus, DHCP servers, area
controllers, and their imperative tending to programming and conventions are an absolute necessity in terms of making
and keeping up an extensive, versatile network. Top execution and legitimate host ID are barely gainful on a network
that has been broken by programmers. It is consequently the security of the network is just as vital.
1.3Security Issues
Network security issues include keeping up network respectability, keeping unapproved clients from penetrating the
framework (survey/taking delicate data, passwords, and so forth.), and ensuring the network dissent of administration
assaults [5]. These issues are extraordinarily amplified as networks increments in size. Bigger networks are more

Volume 2, Issue 11, November 2014

Page 11

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

helpless to assault in light of the fact that they offer more defenseless focuses at which interlopers can get access. More
clients, more passwords, and more equipment mean more places a programmer can attempt to get in [6]. The answer
for these issues incorporate utilizing firewalls and intermediaries, introducing solid antivirus programming, conveying
strict watchword arrangements, making utilization of network examination programming, physically securing
computer networking resources, and conjuring methods that compartmentalize a huge network with inner limits [3].

2. CRYPTOGRAPHY
Cryptography is the practice and investigation of procedures that is utilized for secure correspondence as a part of the
vicinity of outsiders [11]. In more general, it is about developing and investigating conventions that defeat the impact
of outsiders and which are identified with different perspectives in data security, for example, data secrecy, data
respectability, validation, and non-renouncement. Applications of cryptography incorporate ATM cards, computer
passwords, and electronic business. Cryptography is only synonymous with encryption, the transformation of data from
an intelligible state to evident non- discernable one [12]. The originator of an encoded message ought to impart the
unraveling procedure required to recuperate the first data just with planned beneficiaries, consequently dismissing
undesirable persons to do likewise. Cryptography procedures are utilized to encode and decode the data. Present day
cryptography is intensely focused around numerical hypothesis and computer science hone; cryptographic calculations
are planned which are tricky to break by any enemy. It is hypothetically conceivable to break such a framework,
however it is infeasible to do so by any known viable means. These plans are accordingly termed computationally
secure. There are numerous data hypothetically secure plans that are turned out to be can't be equaled the initial
investment with boundless figuring power an illustration is the one-time cushion yet these plans are more hard to
actualize than the best hypothetically weak secure components.

Figure 1 Block diagram for cryptography.


2.1 Cryptography Techniques
Cryptography is one of the fundamental innovations utilized as a part of building a protected VPN [13]. With the
assistance of fundamental calculations we can give both encryptions that keep data mystery and verify the client who
they claim to be. Data classifiedness may be given by one of two classifications of encryption calculation they are
Symmetric cryptography and Asymmetric cryptography. Symmetric or routine cryptography obliges that the sender and
recipient impart a same key which is a thing of mystery data used to scramble and unscramble data. Asymmetric or
Public Key cryptography solves the key exchange problem by using two keys either of which may be used to encrypt a
message. The encrypted data may then only be decrypted by means of the other key. The original unencrypted data will
be referred to as plaintext and the encrypted form as cipher text.
2.1.1 Symmetric cryptography
Symmetric figures utilize the same key to scramble the plaintext and to decode the figure content [13]. The sender and
the beneficiary must hence concur upon this key and it ought not be known to any other individual. The cryptographic
quality of a symmetric calculation is focused around the extent of the key it utilizes. The samples are DES (Data
Encryption Standard), Blowfish, and AES. The DES calculation utilizes a 64-bit key, of which 8 bits are held leaving
56 variable bits. It is conceivable to secure data with 3DES (Triple DES) rather than DES. This implies that the data is
subjected to three progressive encryptions. Blowfish permits implementers to choose a key length of somewhere around
32 and 448 bits however the executions regularly utilize 128-bit keys. In 2002 DES was supplanted by AES as an
encryption standard by the US government. From that point forward AES has ended up extremely mainstream on the
grounds that it joins the velocity of DES with the security level of Triple DES. AES can utilize 128, 192 and 256-bit
keys numerous open AES utilize 128-bit mystery keys naturally. Symmetric calculations are well known on the grounds

Volume 2, Issue 11, November 2014

Page 12

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

that their rate empowers them proficiently to encode extensive amounts of plaintext. There are two subcategories of
symmetric figure they are Stream Ciphers and Block Ciphers.
Table 1: Comparison of Few Cryptographic Techniques [14]

2.1.2 Stream Ciphers


These calculations work upon one bit at once. A stream of plaintext streams into the figure and a stream of figure ext
rise as the yield. Messages encoded with a stream figure are dependably the same size as the first plain content [13].
The encryption happens by method for an operation in which every bit of the plaintext is XORed. The stream figure
concerns the routines by which the imparted key is utilized to produce the stream of random bits. Breaking endeavors
fixate on investigating this random bit generator (Figure 1).

Figure 2 Random bit generator


2.1.3 Block Ciphers
These figures encode data in squares of bytes, instead of a solitary bit at once [13]. Piece sizes fluctuate as indicated by
the calculation, 64 bits being the basic. The plaintext is not as the same as the calculation's square size so cushioning of
information is vital. Case in point, if the piece length is 64 bits and the last square contains just 40 bits then 24 bits of
cushioning must be included. The cushioning string can comprise of all zeros, rotating zeros and ones, random bits, or
some other arrangement. Some encryption standards determine a specific cushioning plan. DES, Blowfish and AES are
square figures. There are two routines for scrambling an arrangement of pieces they are ECB (Electronic Code Book)
mode and CBC (Cipher Block Chaining) ciphertext mode. In ECB indistinguishable squares of plaintext will obviously
produce indistinguishable pieces of ciphertext [13]. A saltine can subsequently abuse reiteration in the ciphertext to
discharge the plaintext rendition. In CBC, a criticism instrument is included with the goal that the consequences of the
encryption of past pieces are bolstered go into the encryption of the current square [13]. Every ciphertext piece is made
ward not just on the plaintext obstruct that produced it, additionally on all past plaintext squares.

3. LITERATURE SURVEY
In [16], G. Di Blasi and G. Gallo and M. Petrilia, has been created composite pictures called Puzzle Image Mosaic
(PIM). This system is propelled by Jigsaw Image Mosaic (JIM), where picture tiles of discretionary shape are utilized to
create the last picture. The JIM methodology prompts great results, yet the obliged calculation time is high. A

Volume 2, Issue 11, November 2014

Page 13

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

calculation is recommended that creates great brings about lower time. The procedure takes advantage from late comes
about data structures meant to streamline closeness inquiries. Exploratory results demonstrate the soundness of our
technique. Riddle Image Mosaic (PIM). PIM is focused around some late systems displayed in Computer Graphics: Fast
Photomosaic and Artificial Mosaic. Uniquely in contrast to JIM, PIM does not perform any deformity of the tiles so as
to make pictures all the more outwardly like Arcimboldo's artistic creations. Like Fast Photomosaic, PIM uses tiles
containing little pictures and embraces the Antipole procedure to accelerate the inquiry process. Further, PIM makes
utilization of the same calculation proposed in Artificial Mosaic for directional rule recognition. This proposed
calculation orchestrates mosaics with a worthy expense, even on unpredictable source pictures. "Photomosaic" change
a data picture into a rectangular network of thumbnail pictures. In this approach the calculation looks in a huge
database of pictures for one that approximates a square of pixels in the primary picture. The ensuing impact is
extremely great. As of late Di Blasi and Petralia introduced a methodology to accelerate the pursuit process. I contrast
our execution and JIM keeping in mind the end goal to survey the nature of our system. It ought to be commented that
the correlation is not totally reasonable on the grounds that the two calculations are planned to marginally diverse
purposes. In [17], another sort of mosaic has proposed by J. Kim and F. Pellacini to be specific Jigsaw Image Mosaic
(JIM), where picture tiles of self-assertive shape is utilized to make the last picture. The era of a Jigsaw Image Mosaic
is an answer for the accompanying issue: given a subjectively formed compartment picture and a set of discretionarily
molded picture tiles, fill the holder as minimally as would be prudent with tiles of comparable color to the holder taken
from the data set while alternatively distorting them marginally to attain an all the more outwardly satisfying impact.
In [18], Y. Dobashi, T. Haga, H. Johan, and T. Nisha proposed a non-photorealistic rendering strategy that makes a
creative impact called mosaicing. This system believers pictures gave by the client into the mosaic pictures. Business
picture altering applications likewise give a comparative capacity. Nonetheless, these applications frequently exchange
results for ease processing. It is attractive to make top notch pictures regardless of the possibility that the computational
expense is expanded. We introduce a programmed system for mosaicing pictures by utilizing Voronoi outlines. The
Voronoi outlines are improved so that the slip between the first picture and the ensuing picture is as little as could
reasonably be expected. Next, the mosaic picture is produced by utilizing the destinations and edges of the Voronoi
graph. Representation fittings can be utilized to effectively create Voronoi graphs. A "Voronoi picture" is a picture
being produced by utilizing Voronoi districts. A "reference picture" is the picture to be changed over into the mosaic
picture. The technique for making mosaic pictures with a higher quality than at present accessible strategies offer. In
[21], a novel methodology for manufactured mosaic era is proposed by . Battiato, G. Gallo, G. C. Guarnera, and G.
Puglisi. Inclination Vector Flow reckoning together with heuristics to expand the secured mosaic range is utilized. The
high recurrence points of interest are overseen in a worldwide manner permitting to protect the mosaic-style likewise
for little ones. Here, we receive an "one-after-one" tile situating and arranging methodology. The proposed
methodology utilizes Gradient Vector Flow (GVF). GVF has the capacity catch the general slope conduct in a fitting
manner. GVF is a field of vectors that minimizes the accompanying vitality capacity. The GVF power field can be
utilized to viably drive tiles situating. Edge data is protected; it is engendered in the nearby locales and blended
together in a smooth manner. A first focal point of the novel system is that it has the capacity better safeguard fine
points of interest. This happens in light of the fact that high recurrence ranges are prioritarily filled. This procedure
overcomes unequivocal edge recognition utilizing the Gradient Vector Flow. This strategy does not cut tiles. In [20], S.
Battiato, G. Di Blasi, G. M. Farinella, and G. Gallo proposed a strategy to be specific, "Computerized Mosaic
Framework". Craftsmanship frequently gives significant insights to innovative advancements particularly in the field of
Image Processing and Computer Graphics. Here, we review in a bound together schema a few techniques to change
raster info pictures into great quality mosaics. For each of the major diverse methodologies in writing the paper reports
a short portrayal and a dialog of the most significant issues. To finish the overview correlations among the distinctive
strategies both regarding visual quality and computational unpredictability are given .

4.LIMITATIONS OF CRYPTOGRAPHIC TECHNIQUES


The Cryptographic methods like encryption can extremely generally used to secure interchanges and put away data
from unapproved access and divulgence. Other cryptographic procedures including strategies for confirmation and
advanced marks can ensure against caricaturing and message falsifications. With the points of interest of the
cryptographic strategies there are additionally restrictions in these methods. Given us a chance to talk about these in
point of interest. Encryption is frequently considered as the answer for all security issues or to dangers that it doesn't
address [15]. Encryption is said as the best approach to secure the data from unapproved get to however the truth of the
matter is that it couldn't stop Computer Crackers. Encryption does nothing to secure against numerous normal
techniques for assault including those that endeavor terrible default settings or vulnerabilities in network conventions
or programming even encryption programming. By and large, routines other than encryption are required to keep out
interlopers. Secure Computing Corporation's Sidewinder framework defuses the forty-two "bombs" (security
vulnerabilities) in Cheswick and Bellovin's book, Firewalls and Network Security (Addison Wesley, 1994), without

Volume 2, Issue 11, November 2014

Page 14

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

making utilization of any encryption. In addition, the security gave by encryption can be imaginory. On the off chance
that the framework where the encryption is performed can be infiltrated, then the gatecrasher may have the capacity to
get to plaintext straightforwardly from put away records or the substance of memory or alter network conventions,
application programming, or encryption programs to get access to keys or plaintext data or to modify the encryption
process. For instance, PGP (Pretty Good Privacy) could be supplanted with a Trojan horse that seems to carry on like
PGP however makes a mystery document of the client's keys for later transmission. A Trojan horse login project gathers
passwords. A late investigation of 8932 computers by the Defence Information Systems Agency demonstrated 88% of
the computers could be effectively assaulted. Utilizing PGP to encode data transmitted from or put away on the normal
framework could be similar to putting the strongest bolt on the indirect access of a building while leaving the front
entryway completely open. Data security obliges significantly more than simply encryption - verification, design
administration, great configuration, access controls, firewalls, reviewing, security practices, and security mindfulness
preparing are a couple of alternate procedures required Confinement of utilizing open key cryptography for encryption
is pace [15] and keysize as demonstrated in table 1. There are numerous mystery key encryption strategies that are
essentially speedier than any at present accessible open key encryption strategy. However open key cryptography can be
utilized with mystery key cryptography to bamboozle both. For encryption, the best arrangement is to consolidate open
and mystery key frameworks with a specific end goal to get both the security focal points of open key frameworks and
the velocity preferences of mystery key frameworks. Open key cryptography may be helpless against mimic, regardless
of the fact that clients' private keys are not accessible. In a few circumstances, open key cryptography is redundant and
mystery key cryptography alone is sufficient. These incorporate situations where secure mystery key conveyance can
happen, for instance, by clients meeting in private. It additionally incorporates situations where a solitary power knows
and deals with all the keys, for instance, a shut saving money framework. Since the power knows everybody's keys as of
now, there is very little focal point for some to be "open" and others to be "private." Note, be that as it may, that such a
framework may get to be unrealistic if the quantity of clients gets to be extensive; there are not so much any such limits
in an open key framework.

5.CONCLUSION
In this paper we did a detailed study on Security Issues in Computer Networks and Encryption Techniques. We have
compared few basic encryption algorithms with each other. From the above discussion it is clear that the existing
solutions related to security is not enough and for the future need new ideas has to be implemented along with the
existing techniques. The concepts like steganography can be combined with the cryptography will become a powerful
tool for security. In the near future, the most important use of stenographic techniques will probably be lying in the
field of digital watermarking.

References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]

http://www.tutorialspoint.com/data_communication_computer_network/
http://www.icaiknowledgegateway.org/littledms/folder1/chapter-3-computer-networks-network-security.pd
http://www.gettingyouconnected.com/the-top-3-issues-affecting-todays-large-computer-networks/
http://docwiki.cisco.com/wiki/Quality_of_Service_Networking
http://www.gettingyouconnected.com/network-security-and-preserving-network-integrity/
http://www.gettingyouconnected.com/data-security-issues-on-computer-networks/
http://en.wikipedia.org/wiki/Information_security
M. S. Lew, N. Sebe, C. Djeraba, and R. Jain, Content- based multimedia information retrieval:p state of the art
and challenges, ACM Trans. Multimedia Comput, Feb. 2006.
[9] Harikrishna Narasimhan, Sanjeev Satheesh, A Randomized Itersative Improvement Algorithm for Photomosaic
Generation, Vol 2,April 2010.
[10] http://www.utica.edu/faculty_staff/qma/needforsecurity.pdf
[11] http://en.wikipedia.org/wiki/Cryptography
[12] http://my.ss.sysu.edu.cn/WebSec/download/chap2.pdf
[13] https://community.ja.net/library/advisory-services/introduction-cryptographic-techniques
[14] http://www.javamex.com/tutorials/cryptography/ciphers.shtml
[15] http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/advantages-and-disadvantages.htm
[16] G. Di Blasi and G. Gallo and M. Petrilia, Puzzle image mosaic, in proc. IASTED/VIIP, Benidrom, Spain, Sep.
2005.
[17] J. Kim and F. Pellacini, Jigsaw image mosaics, in Proc SIGGRAPH, San Antonio, Jul 2002.
[18] Y. Dobashi, T. Haga, H. Johan, and T. Nisha, A method for creating mosaic image using voronoi diagrams, in
proc. Eurographiocs, Saarbrucken, Germany, Sep. 2002.

Volume 2, Issue 11, November 2014

Page 15

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 2, Issue 11, November 2014

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email: editoriijit@ipasj.org
ISSN 2321-5976

[19] S. Battiato, G. Gallo, G. C. Guarnera, and G. Puglisi, Artificial mosaic by gradient vector flow, in proc.
Eurographics, April 2008.
[20] S. Battiato, G. Di Blasi, G. M. Farinella, and G. Gallo, Digital Mosaic framework: AN overview, Eurograph.
Comput. Graph. Forum, vol.26, no. 4, pp, Dec 2007.
[21] S.Battiato, Gianpiero Di blasi, Glovanni Gallo, A Novel Artificial Mosaic Generation Technique Driven by Local
Gradient Analysis.

Volume 2, Issue 11, November 2014

Page 16

S-ar putea să vă placă și