Applied cryptography in network systems security for cyberattack prevention

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman and Sbai, Fatim (2021) Applied cryptography in network systems security for cyberattack prevention. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.

[thumbnail of Applied Cryptography in Network Systems Security for Cyberattack Prevention - Yeboah-Ofori et al 2022.pdf]
Preview
PDF
Applied Cryptography in Network Systems Security for Cyberattack Prevention - Yeboah-Ofori et al 2022.pdf - Accepted Version

Download (722kB) | Preview

Abstract

Application of cryptography and how various encryption algorithms methods are used to encrypt and decrypt data that traverse the network is relevant in securing information flows. Implementing cryptography in a secure network environment requires the application of secret keys, public keys, and hash functions to ensure data confidentiality, integrity, authentication, and non-repudiation. However, providing secure communications to prevent interception, interruption, modification, and fabrication on network systems has been challenging. Cyberattacks are deploying various methods and techniques to break into network systems to exploit digital signatures, VPNs, and others. Thus, it has become imperative to consider applying techniques to provide secure and trustworthy communication and computing using cryptography methods. The paper explores applied cryptography concepts in information and network systems security to prevent cyberattacks and improve secure communications. The contribution of the paper is threefold: First, we consider the various cyberattacks on the different cryptography algorithms in symmetric, asymmetric, and hashing functions. Secondly, we apply the various RSA methods on a network system environment to determine how the cyberattack could intercept, interrupt, modify, and fabricate information. Finally, we discuss the secure implementations methods and recommendations to improve security controls. Our results show that we could apply cryptography methods to identify vulnerabilities in the RSA algorithm in secure computing and communications networks.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9781665478786
Identifier: 10.1109/icsiot55070.2021.00017
Page Range: pp. 43-48
Identifier: 10.1109/icsiot55070.2021.00017
Additional Information: Proceedings: https://www.computer.org/csdl/proceedings/icsiot/2021/1AUoYB886u4
Keywords: Applied Cryptography, Network Security, RSA, Interception, Interruption, Modification, Fabrication.
Subjects: Computing > Information security > Cyber security
Related URLs:
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 24 Feb 2022 01:35
Last Modified: 04 Nov 2024 11:30
URI: https://repository.uwl.ac.uk/id/eprint/8806

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu