Open Access   Article Go Back

Security Enhancement through Cryptography and Hardware Devices

Aruna Devi.T1 , Tejaswini S Majjigi2 , hyam Vaibhav. M S3

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-09 , Page no. 76-79, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si9.7679

Online published on Apr 30, 2019

Copyright © Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S, “Security Enhancement through Cryptography and Hardware Devices,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.76-79, 2019.

MLA Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S "Security Enhancement through Cryptography and Hardware Devices." International Journal of Computer Sciences and Engineering 07.09 (2019): 76-79.

APA Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S, (2019). Security Enhancement through Cryptography and Hardware Devices. International Journal of Computer Sciences and Engineering, 07(09), 76-79.

BibTex Style Citation:
@article{Devi.T_2019,
author = {Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S},
title = {Security Enhancement through Cryptography and Hardware Devices},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {76-79},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=958},
doi = {https://doi.org/10.26438/ijcse/v7i9.7679}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.7679}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=958
TI - Security Enhancement through Cryptography and Hardware Devices
T2 - International Journal of Computer Sciences and Engineering
AU - Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 76-79
IS - 09
VL - 07
SN - 2347-2693
ER -

           

Abstract

Security is being a hot topic in present digital era. The growing usage of technology for communication generates data which is available everywhere but data security is the important issue which draws the attention of all. Cryptography and security is a notion to secure the network and information transmission through wireless network. With ever progression in digital system security has been appeared as a major concern. In this era of virus and hackers of electronic bugs and electronic fraud security is primary. The concept of hardware security has been normally related with the cybersecurity and cryptography. Cyber-attacks are usually more due to lots of users connected to the internet. The basic issues in guarding the safe transmission of data through the web are concern of the security. This paper emphasizes on the key concepts of cryptography and security on critical infrastructure devices to overcome the threats of computer network security.

Key-Words / Index Term

Cryptography, Cybersecurity, Network Security, Hardware security

References

[1] Shyam Nandan kumar,” Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol.3, No.1,1- 11.
[2] Jim Attridge, “An Overview of Hardware Security Modules” Version 1.2 of GSEC Practical Assignment for GIAC Certification, January 14, 2002.
[3] Yier Jin, “Introduction to Hardware Security”, Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA.|13 October 2015
[4] Dr Sandeep Tayal, Dr Nipin Gupta, Dr Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, ISSN 0973-6107 Volume 10, Number 5, 2017.
[5] Sarita Kumari,”A research paper on cryptography Encryption and compression Techniques”, International Journal Of Engineering And Computer Science, ISSN:2319-7242 Volume 6,4 April 2017.
[6] Shivangi Goyal,”A Survey on the Applications of Cryptography”, International Journal of Engineering and Technology Volume 2 No. 3, March, 2012.
[7] Banga, M., Hsiao, M. VITAMIN,” Voltage Inversion Technique to Ascertain Malicious Insertion in ICs”, In proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA, USA, 27-27 July 2009, pp. 104-107.
[8] Love E. Jin, Makris Y,” Proof-Carrying Hardware Intellectual property: A Pathway to Trusted Module Acquisition”, IEEE Trans. Inf. Forensics Secure, 2012, 7, 25-40.
[9] Chakraborty R, Wolff F Paul, S Papachristou, C Bhunia, S. MERO, “A Statistical Approach for Hardware Trojan Detection”, In Cryptographic Hardware and Embedded Systems” CHES 2009, Springer: Berlin, Germany; Heidelberg, Germany, 2009, Volume 5747, pp. 396–410.
[10] Bloom G, Simha R, Narahari B, “OS Support for Detecting Trojan Circuit Attacks”, In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009, pp. 100–103.
[11] Banerjee, S.K. Pandey, “Research on software security awareness: problems and prospects”, ACM SIGSOFT Software Engineering 35(5):1-5 October 2010.