Security Enhancement through Cryptography and Hardware Devices
Aruna Devi.T1 , Tejaswini S Majjigi2 , hyam Vaibhav. M S3
Section:Survey Paper, Product Type: Journal Paper
Volume-07 ,
Issue-09 , Page no. 76-79, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.7679
Online published on Apr 30, 2019
Copyright © Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S, “Security Enhancement through Cryptography and Hardware Devices,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.76-79, 2019.
MLA Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S "Security Enhancement through Cryptography and Hardware Devices." International Journal of Computer Sciences and Engineering 07.09 (2019): 76-79.
APA Style Citation: Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S, (2019). Security Enhancement through Cryptography and Hardware Devices. International Journal of Computer Sciences and Engineering, 07(09), 76-79.
BibTex Style Citation:
@article{Devi.T_2019,
author = {Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S},
title = {Security Enhancement through Cryptography and Hardware Devices},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {76-79},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=958},
doi = {https://doi.org/10.26438/ijcse/v7i9.7679}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.7679}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=958
TI - Security Enhancement through Cryptography and Hardware Devices
T2 - International Journal of Computer Sciences and Engineering
AU - Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 76-79
IS - 09
VL - 07
SN - 2347-2693
ER -
Abstract
Security is being a hot topic in present digital era. The growing usage of technology for communication generates data which is available everywhere but data security is the important issue which draws the attention of all. Cryptography and security is a notion to secure the network and information transmission through wireless network. With ever progression in digital system security has been appeared as a major concern. In this era of virus and hackers of electronic bugs and electronic fraud security is primary. The concept of hardware security has been normally related with the cybersecurity and cryptography. Cyber-attacks are usually more due to lots of users connected to the internet. The basic issues in guarding the safe transmission of data through the web are concern of the security. This paper emphasizes on the key concepts of cryptography and security on critical infrastructure devices to overcome the threats of computer network security.
Key-Words / Index Term
Cryptography, Cybersecurity, Network Security, Hardware security
References
[1] Shyam Nandan kumar,” Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol.3, No.1,1- 11.
[2] Jim Attridge, “An Overview of Hardware Security Modules” Version 1.2 of GSEC Practical Assignment for GIAC Certification, January 14, 2002.
[3] Yier Jin, “Introduction to Hardware Security”, Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA.|13 October 2015
[4] Dr Sandeep Tayal, Dr Nipin Gupta, Dr Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, ISSN 0973-6107 Volume 10, Number 5, 2017.
[5] Sarita Kumari,”A research paper on cryptography Encryption and compression Techniques”, International Journal Of Engineering And Computer Science, ISSN:2319-7242 Volume 6,4 April 2017.
[6] Shivangi Goyal,”A Survey on the Applications of Cryptography”, International Journal of Engineering and Technology Volume 2 No. 3, March, 2012.
[7] Banga, M., Hsiao, M. VITAMIN,” Voltage Inversion Technique to Ascertain Malicious Insertion in ICs”, In proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA, USA, 27-27 July 2009, pp. 104-107.
[8] Love E. Jin, Makris Y,” Proof-Carrying Hardware Intellectual property: A Pathway to Trusted Module Acquisition”, IEEE Trans. Inf. Forensics Secure, 2012, 7, 25-40.
[9] Chakraborty R, Wolff F Paul, S Papachristou, C Bhunia, S. MERO, “A Statistical Approach for Hardware Trojan Detection”, In Cryptographic Hardware and Embedded Systems” CHES 2009, Springer: Berlin, Germany; Heidelberg, Germany, 2009, Volume 5747, pp. 396–410.
[10] Bloom G, Simha R, Narahari B, “OS Support for Detecting Trojan Circuit Attacks”, In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009, pp. 100–103.
[11] Banerjee, S.K. Pandey, “Research on software security awareness: problems and prospects”, ACM SIGSOFT Software Engineering 35(5):1-5 October 2010.