Visible to the public Applied Cryptography in Network Systems Security for Cyberattack Prevention

TitleApplied Cryptography in Network Systems Security for Cyberattack Prevention
Publication TypeConference Paper
Year of Publication2021
AuthorsYeboah-Ofori, Abel, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman, Sbai, Fatim
Conference Name2021 International Conference on Cyber Security and Internet of Things (ICSIoT)
KeywordsApplied Cryptography, cryptography, Encryption, fabrication, Hash functions, Interception, Interruption, modification, Network security, pubcrawl, Public key, resilience, Resiliency, RSA, Trustworthy Systems, Virtual private networks
AbstractApplication of cryptography and how various encryption algorithms methods are used to encrypt and decrypt data that traverse the network is relevant in securing information flows. Implementing cryptography in a secure network environment requires the application of secret keys, public keys, and hash functions to ensure data confidentiality, integrity, authentication, and non-repudiation. However, providing secure communications to prevent interception, interruption, modification, and fabrication on network systems has been challenging. Cyberattacks are deploying various methods and techniques to break into network systems to exploit digital signatures, VPNs, and others. Thus, it has become imperative to consider applying techniques to provide secure and trustworthy communication and computing using cryptography methods. The paper explores applied cryptography concepts in information and network systems security to prevent cyberattacks and improve secure communications. The contribution of the paper is threefold: First, we consider the various cyberattacks on the different cryptography algorithms in symmetric, asymmetric, and hashing functions. Secondly, we apply the various RSA methods on a network system environment to determine how the cyberattack could intercept, interrupt, modify, and fabricate information. Finally, we discuss the secure implementations methods and recommendations to improve security controls. Our results show that we could apply cryptography methods to identify vulnerabilities in the RSA algorithm in secure computing and communications networks.
DOI10.1109/ICSIoT55070.2021.00017
Citation Keyyeboah-ofori_applied_2021