Open Access Open Access  Restricted Access Subscription or Fee Access

A Review Paper on Network Security and Cryptography by using Hash Algorithm

Somya Rastogi


Security of information is the most extreme issue now days for exchanging the data from one end to another end through web. Cryptography is a popular way of sending vital information in a secrete way which is not understandable to unauthorized user. Digital signature, integrity and authentication are the factors of cryptography.


Cryptography, decryption, encryption, hashing algorithm, security

Full Text:



Tayal S, Gupta N, Gupta P. et al. A Review paper on Network Security and Cryptography. Advances in Computational Sciences and Technology. 2017;10(5):763–70.

Kumari S. A research paper on cryptography encryption and compression techniques. International Journal of Engineering and Computer Science. 2017;6(4).

Tejashri Maruti Dumbre, Swati Dadabhau Jaid, Priyanka Dnyaneshwar Dherange. Network Security and Cryptography. International Journal of Research in Advent Technology (IJRAT) .2017.

Usha Devi, Preeti, Nisha Rani,. Network Security using Cryptography. International Journal of Innovations & Advancement in Computer Science IJIACS .2017;6(12).

Hercigonja Z. Comparative analysis of cryptographic algorithms. International Journal of Digital Technology & Economy. 2016;1(2):127–34.

Kumar SN. Review on network security and cryptography. International Transaction of Electrical and Computer Engineers System. 2015;3(1):1–1.

Dixit PH, Waskar KB, Bombale UL. Multilevel network security combining cryptography and steganography on ARM platform. Journal of Embedded Systems. 2015;3(1):11–5.

Koko SO, Babiker A. Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication. IOSR Journal of Computer Engineering (IOSR- JCE). 2015 ;17(1):62–9.

Garg P, Dilawari JS. A Review Paper on Cryptography and Significance of Key Length. IJCSCE Special issue on Emerging Trends in Engineering. ICETIE. 2012.

Krishnamurthy GN, Ramaswamy V. Making AES stronger: AES with key dependent S-box. IJCSNS International Journal of Computer Science and Network Security. 2008;8(9):388–98.


  • There are currently no refbacks.