Title | Applied Cryptography in Network Systems Security for Cyberattack Prevention |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Yeboah-Ofori, Abel, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman, Sbai, Fatim |
Conference Name | 2021 International Conference on Cyber Security and Internet of Things (ICSIoT) |
Keywords | Applied Cryptography, cryptography, Encryption, fabrication, Hash functions, Interception, Interruption, modification, Network security, pubcrawl, Public key, resilience, Resiliency, RSA, Trustworthy Systems, Virtual private networks |
Abstract | Application of cryptography and how various encryption algorithms methods are used to encrypt and decrypt data that traverse the network is relevant in securing information flows. Implementing cryptography in a secure network environment requires the application of secret keys, public keys, and hash functions to ensure data confidentiality, integrity, authentication, and non-repudiation. However, providing secure communications to prevent interception, interruption, modification, and fabrication on network systems has been challenging. Cyberattacks are deploying various methods and techniques to break into network systems to exploit digital signatures, VPNs, and others. Thus, it has become imperative to consider applying techniques to provide secure and trustworthy communication and computing using cryptography methods. The paper explores applied cryptography concepts in information and network systems security to prevent cyberattacks and improve secure communications. The contribution of the paper is threefold: First, we consider the various cyberattacks on the different cryptography algorithms in symmetric, asymmetric, and hashing functions. Secondly, we apply the various RSA methods on a network system environment to determine how the cyberattack could intercept, interrupt, modify, and fabricate information. Finally, we discuss the secure implementations methods and recommendations to improve security controls. Our results show that we could apply cryptography methods to identify vulnerabilities in the RSA algorithm in secure computing and communications networks. |
DOI | 10.1109/ICSIoT55070.2021.00017 |
Citation Key | yeboah-ofori_applied_2021 |