Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology

Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology

Anjana S. Chandran
Copyright: © 2022 |Volume: 16 |Issue: 2 |Pages: 18
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180210|DOI: 10.4018/IJISP.308306
Cite Article Cite Article

MLA

Chandran, Anjana S. "Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology." IJISP vol.16, no.2 2022: pp.1-18. http://doi.org/10.4018/IJISP.308306

APA

Chandran, A. S. (2022). Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology. International Journal of Information Security and Privacy (IJISP), 16(2), 1-18. http://doi.org/10.4018/IJISP.308306

Chicago

Chandran, Anjana S. "Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology," International Journal of Information Security and Privacy (IJISP) 16, no.2: 1-18. http://doi.org/10.4018/IJISP.308306

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A huge amount of data has been generated every day across the world by organizations with the emergence of the World Wide Web, social networks, along with e-commerce applications. To safeguard the network along with data transmission that occurs over a wireless network, cryptography along with network security (NS) is utilized. In data transmission over a wireless untrustworthy network, securing data is a major concern. Providing security to the wireless sensor networks is highly significant; NS provides security not only to the end system but also to all over the network system. Consequently, NS, cryptography, present progress in NS, linear cryptanalysis (LC), together with differential cryptanalysis (DC) are explicated in this work. The outcomes of the encryption time (ET) versus file size for data encryption standard (DES), advanced encryption standard (AES), 3DES, Rivest-Shamir-Adleman (RSA), blowfish, and the decryption time (DT) versus file size for RSA, AES, modified RSA (MRSA), and nth degree truncated polynomial ring units (NTRU) are also evaluated in this paper.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.