Open In App
Related Articles

Cryptography and Network Security Principles

Like Article
Save Article
Report issue

In present day scenario security of the system is the sole priority of any organisation. The main aim of any organisation is to protect their data from attackers. In cryptography, attacks are of two types such as Passive attacks and Active attacks

Passive attacks are those that retrieve information from the system without affecting the system resources while active attacks are those that retrieve system information and make changes to the system resources and their operations. 

Figure : 1.1

In figure 1.1 it made the text secure by forming it into cipher text using encryption algorithm and further decryption to use it. 

The Principles of Security can be classified as follows: 


  1. Confidentiality: 
    The degree of confidentiality determines the secrecy of the information. The principle specifies that only the sender and receiver will be able to access the information shared between them. Confidentiality compromises if an unauthorized person is able to access a message. 

    For example, let us consider sender A wants to share some confidential information with receiver B and the information gets intercepted by the attacker C. Now the confidential information is in the hands of an intruder C. 

  2. Authentication: 
    Authentication is the mechanism to identify the user or system or the entity. It ensures the identity of the person trying to access the information. The authentication is mostly secured by using username and password. The authorized person whose identity is preregistered can prove his/her identity and can access the sensitive information. 

  3. Integrity: 
    Integrity gives the assurance that the information received is exact and accurate. If the content of the message is changed after the sender sends it but before reaching the intended receiver, then it is said that the integrity of the message is lost. 
  • System Integrity: System Integrity assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent  unauthorized manipulation of the system.
  • Data Integrity: Data Integrity assures that information (both stored and in transmitted packets) and programs are changed only in a specified and  authorized manner.

      4. Non-Repudiation: 
         Non-repudiation is a mechanism that prevents the denial of the message content sent through a network. In some cases the sender sends                 the message and later denies it. But the non-repudiation does not allow the sender to refuse the receiver. 


      5. Access control: 
         The principle of access control is determined by role management and rule management. Role management determines who should access              the data while rule management determines up to what extent one can access the data. The information displayed is dependent on the                    person who is accessing it. 


       6. Availability: 
          The principle of availability states that the resources will be available to authorize party at all times. Information will not be useful if it is not                available to be accessed. Systems should have sufficient availability of information to satisfy the user request. 

        7. Issues of ethics and law
            The following categories are used to categorize ethical dilemmas in the security system.

             Individuals’ right to access personal information is referred to as privacy.
             Property: It is concerned with the information’s owner.
             Accessibility is concerned with an organization’s right to collect information.

             Accuracy: It is concerned with the obligation of information authenticity, fidelity, and accuracy.


Last Updated : 24 Jan, 2023
Like Article
Save Article
Share your thoughts in the comments
Similar Reads