Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman and Sbai, Fatim (2021) Applied cryptography in network systems security for cyberattack prevention. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.
Preview |
PDF
Applied Cryptography in Network Systems Security for Cyberattack Prevention - Yeboah-Ofori et al 2022.pdf - Accepted Version Download (722kB) | Preview |
Abstract
Application of cryptography and how various encryption algorithms methods are used to encrypt and decrypt data that traverse the network is relevant in securing information flows. Implementing cryptography in a secure network environment requires the application of secret keys, public keys, and hash functions to ensure data confidentiality, integrity, authentication, and non-repudiation. However, providing secure communications to prevent interception, interruption, modification, and fabrication on network systems has been challenging. Cyberattacks are deploying various methods and techniques to break into network systems to exploit digital signatures, VPNs, and others. Thus, it has become imperative to consider applying techniques to provide secure and trustworthy communication and computing using cryptography methods. The paper explores applied cryptography concepts in information and network systems security to prevent cyberattacks and improve secure communications. The contribution of the paper is threefold: First, we consider the various cyberattacks on the different cryptography algorithms in symmetric, asymmetric, and hashing functions. Secondly, we apply the various RSA methods on a network system environment to determine how the cyberattack could intercept, interrupt, modify, and fabricate information. Finally, we discuss the secure implementations methods and recommendations to improve security controls. Our results show that we could apply cryptography methods to identify vulnerabilities in the RSA algorithm in secure computing and communications networks.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISBN: | 9781665478786 |
Identifier: | 10.1109/icsiot55070.2021.00017 |
Page Range: | pp. 43-48 |
Identifier: | 10.1109/icsiot55070.2021.00017 |
Additional Information: | Proceedings: https://www.computer.org/csdl/proceedings/icsiot/2021/1AUoYB886u4 |
Keywords: | Applied Cryptography, Network Security, RSA, Interception, Interruption, Modification, Fabrication. |
Subjects: | Computing > Information security > Cyber security |
Related URLs: | |
Depositing User: | Dr Abel Yeboah-Ofori |
Date Deposited: | 24 Feb 2022 01:35 |
Last Modified: | 04 Nov 2024 11:30 |
URI: | https://repository.uwl.ac.uk/id/eprint/8806 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |