Home / Articles
CRYPTOGRAPHIC PROTOCOL IN NETWORK SECURITY |
![]() |
Author Name Dr.G.Sripriya, Shahid. S and Lethish.k Abstract Cryptographic protocols and try to give insight into their strategies, design, security principles and performance principles in relation to one another. As communications in the digital world becomes more frequent, the importance of secure communication through the use of cryptosystems will become more prevalent. Following the growth of online transactions, cloud computing and the Internet of Things (IoTs), the quest for sophisticated cryptographic techniques is gaining importance. I first analyzed cryptographic protocols by grouping them in accordance to the functional objectives they achieve like key management such as key exchange, user identification through authentication, signing documents using digital signatures, secure multiparty computation and zero knowledge proofs. There are practical algorithms like Diffie-Hellman key exchange and RSA that use classical protocols and advanced implementations like Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), post-quantum cryptographic algorithm, and coin blockchain-based security protocols. I focus on the advancement of these cryptographic protocols in the light of newly developed threats such as quantum computers and side-channel attacks. I further investigated the different aspects of the challenges and vulnerabilities posed by the cryptographic protocols like man-in-the-middle and replay attacks, and the lack of key management strength. In this paper I examine the current models of security built using the cryptosystems and their merit in defence against these attacks.
Keywords-Cryptographic Protocols, Encryption, Decryption, KeyExchange, Authentication Digital Signatures
Published On : 2025-03-06 Article Download : ![]() |