Network Security and Cryptography

One among the many project domains given by S-LOGIX , network security and cryptography is also one. The need for Network Security is gaining its own significance in these recent times. With a Network Security System, all the files, data & personal information are kept safe and protected from unauthorized access from people present on the network and people outside it. Therefore, it is widely used in offices, banks, and many other organizations. The provisions and policies of Network Security help the network administrator to monitor any kind of misuse, modification or unauthorized access of a computer network. Thus, a number of cyber attacks and other harmful activities are prevented .

Cryptography poses a threat to organizations and individuals too. With encryption, an employee of a company can sell proprietary electronic information to a competitor without the need to photocopy and handle physical documents. Electronic information can be bought and sold on “black networks” such as Black-Net with complete secrecy and anonymity — a safe harbor for engaging in both corporate and government espionage. The keys that unlock a corporation’s files may be lost, corrupted, or held hostage for ransom, thus rendering valuable information in accessible. This domain is selected by S-LOGIX for project working in order to meet every other student who are eager to work in many different domains.

Related Area

  • Authentication
  • Privacy
  • Access control
  • Confidentiality
  • Using Symmetric Cryptography -DES, Triple-DES, AES
  • Using Public-Key Cryptography- RSA, ECC, ElGamal
  • One-Way Hash Functions- MD4, MD5, SHA, RIPE-MD, MAC
  • Digital Signatures-DSA
  • Undeniable Digital Signatures
  • Proxy Signatures
  • Group Signatures
  • Blind Signatures
  • Authentication and Key Exchange
  • Diffie-Hellman, Encrypted Key Exchange
  • Secret Sharing
  • Zero-Knowledge Proofs of Identity
  • Identity-Based Public-Key Cryptography
  • Digital Cash
  • Secure Elections
  • Key Management
  • Data Encryption Standard (DES)
  • Public-Key Cryptography Standards (PKCS)
  • Universal Electronic Payment System (UEPS)
  • Kerberos
  • Privacy-Enhanced Mail (PEM)
  • Message Security Protocol (MSP)
  • Pretty Good Privacy (PGP)
  • SSL
  • Anonymity
  • Digital Rights Management
  • Watermarking
  • Steganography

Tools and Technologies

  • Netbeans 8.0.1
  • Eclipse – Indigo SR2
  • Tomcat 8.0.27
  • Glass Fish 4.0
  • MySQL 5.5.40
  • SQL-Server /MS-Access
  • Apache Axis2
  • ArgoUML 0.34
  • Java Database Connectivity (JDBC)
  • Swings
  • Collections
  • Java Networking
  • Java Server Pages (JSP)
  • Servlets
  • Java Security
  • Java Math
  • Jini
  • Java API for Peer-to-Networks (JXTA)
  • Java API for XML Web Services (JAX-WS)
  • Remote Method Invocation (RMI)
  • Java Naming and Directory Interface (JNDI)
  • Enterprise Java Bean (EJB)
  • Java Message Service (JMS)
  • Java Media Framework (JMF)
  • Java API For XML Processing (JAXP)
  • Java Architecture For XML Binding (JAXB)
  • Apache Jena – Jena Ontology
  • Java Speech
  • Java Advanced Imaging
  • Java FX – Rich Client Platform
  • Java Data Mining