Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- With the advancement in technology, a need II. HACKING – A LITERATURE REVIEW
for secured data communication also arises which is
fulfilled by security mechanism techniques like data The term “Hacker” originally refers to someone who
integrity, digital signatures, Traffic Padding, Routing analysed computers deeply. Today, media recognised
Control, and access control. In various organizations, Hackers as “those who committed computer crimes”
enterprises and institutions, network privacy is involved [1].Two serious types of hackers include paid hackers and
and it is one of the major parameters. Confidentiality of underemployed hackers. Criminal hackers, students,
the information is a foremost thing for a concern. For security experts are the major categories in which a hacker
the protection of data and secured communication, this is likely to fall under. Ethical hacking is hired in large
paper aims at implementing several algorithms and internet service based corporations. Hacking trend is
mechanism techniques. increasing on a large basis particularly among the students.
Students enroll in computer-related courses. 80% of
I. INTRODUCTION hacking activity on the Internet is caused because of student
hackers. Using a computer network directly, Internet
The term cryptography refers to “secret writing”. connection, Remote control server are the major ways
Commonly termed as “Cipher-system”, Cryptography is a through which a hacker tries to access network. A series of
technique used to transform and transmit highly methods are used by hackers in order to target an attack.
confidential data or Information in an encoded way so that When the resources are infected with virus or malware
only authorized can obtain or work on it and illegal data significant data loss occurs along with the eradication of
accessing can be avoided. It is a Greek origin word in components of the network [6]. Through these virus
which “crypto” refers to hidden and “graphy” refers to activities, hard disks and processors gets destroyed and it
writing, so cryptography refers to hiding or secret writing. utilises large scale memory and slows down the system’s
Cryptography can also be referred to the “art and science of performance[9].
achieving security by encoding message to make them non-
readable which means it is used for privacy purpose”
.Cryptography introduces techniques such as
confidentiality, integrity and authenticity within on-going
data communication.
Fig 2
Fig 3
The left and right halves of the output are D. Advanced Encryption Standard:
interchanged and pre-output is produced[4]. DES structure Advanced Encryption standard also known as AES
is similar to Feistal cipher. In the case of DES decryption, which is intended for replacing DES method of encryption.
the same technique which is used for data encryption It is a symmetric block cipher technique[4]. In AES, the
standard is followed with the keys reversed. block size of plaintext is 128-bits which is considered by
the cipher. The length of the key can be 16,24 ,32 bytes.
This can be referred to as AES-128, AES-192 or AES-256
algorithms which depends on the length of the key.
Fig 4
The input given to the encryption and decryption performed on data stored in an array is defined by AES
algorithm is always a 128-bit block. In the case of FIPS structure. In the first (N-1) rounds, four distinct functions
PUB, 4*4 square matrix of bits is the input considered. The occur. They are SubBytes, ShiftRows, MixColumns and
cipher consists of ‘N’ number of rounds and ‘N’ depends AddRoundKey[4]. In each transformation, there will be one
upon the key length. The number of transformations to be or more 4*4 matrix as input and 4*4 matrix as output.
Routing Control:
Routing control involves continuously monitoring the
route to establish the shortest path between the sender and
the receiver to provide communication. The information
which is carried on certain security labels may be restricted
by a security policy to pass through certain links. Handling
the switching policy of outgoing data between ISPs in real
time and its evaluation can be analysed using routing
control[10].