Communication Security in Computer Networks: Encryption Methods and Performance Evaluation
Downloads
With the increasing complexity and interconnectivity of networks, numerous cyber threats have emerged, including data interception, packet manipulation, man-in-the-middle attacks, spoofing, and Denial-of-Service (DoS) attacks. In response to these risks, data encryption stands out as one of the most effective strategies for safeguarding the confidentiality and integrity of information transmitted over networks. This study aims to analyze and compare several encryption methods employed in securing communications within computer networks, using simulations conducted in the MATLAB environment. Data encryption scenarios will be implemented, and the performance of the algorithms will be assessed based on metrics such as execution time, key size, and the impact on communication latency.
Downloads
Stallings, W. Cryptography and Network Security: Principles and Practice, 7th Edition, Pearson, 2016. ISBN: 9780134444284.
Kurose, J. F., & Ross, K. W. Computer Networking: A Top-Down Approach, 7th Edition, Pearson, 2017. ISBN: 9780133594140.
T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems,” ACM Computing Surveys, vol. 39, no. 1, pp. 1–42, Apr. 2007.
MathWorks Documentation – MATLAB Cryptography & Performance Tools https://www.mathworks.com/help/.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. Handbook of Applied Cryptography, CRC Press, 1996. https://cacr.uwaterloo.ca/hac/.
Rivest, R. L., Shamir, A., & Adleman, L. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, Vol. 21, No. 2, pp. 120–126, 1978.
Daemen, J., & Rijmen, V. The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, 2002. ISBN: 9783540425809.




