Report on Contemporary Cyber Security Issues


Authors : Sarah Fawzia; Mujiba Shaima; Norun Nabi; Mazharul Islam Tusher; Nasir Uddin Rana

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/4xne7bbh

Scribd : https://tinyurl.com/2m6mcudn

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY785

Abstract : The contemporary landscape of cybersecurity is fraught with challenges, necessitating a keen understanding of evolving threats and robust defense mechanisms. By examining the Data Encryption Standard (DES) as a key element therein, this paper explores the complexities of cryptography, a foundational element of contemporary security paradigms. Securing confidential data from unwanted access is one of the many facets of cryptography, the art of secure communication. In the context of data protection, DES is recognized as a foundational cryptographic algorithm, valued for both its historical importance and ongoing applicability. But as technology moves more quickly and cyberattacks get more complex, DES's effectiveness is called into question, which has sparked debate about whether it is still sufficient in modern security scenarios. Here, in this paper we explore the complexities surrounding cryptography and DES, elucidating their strengths, limitations, and implications for cybersecurity practices. By examining current trends and emerging challenges, it endeavors to offer insights into mitigating risks and fortifying defenses against cyber threats in the digital age.

Keywords : Cryptography, Data Encryption Standard (DES), Advanced Encryption Standard (AES).

References :

  1. Mujiba, S., Nurun, N., Md, NUD., Md, TA., Estaq, A., Mazaharul, IT., Moushumi, HM., Quazi, SM. (2024). Elon Musk’s Neuralink Brain Chip: a review on ‘Brain-Reading’ device. Journal of Computer Science and Technology Studies. 6(1). 200-203. https://doi.org/10.32996/jcsts.2024.6.1.22
  2. Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer. https://doi.org/10.1007/978-3-642-04101-3
  3. Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Doubleday.
  4. National Institute of Standards and Technology. (2001). Federal information processing standards publication 197: Advanced encryption standard (AES). https://csrc.nist.gov/publications/detail/ fips/197/final
  5. M. Das, X. Tao, and J. C. P. Cheng. (2021). BIM security: A critical review and recommendations using encryption strategy and blockchain. Automation in construction.126 https://doi.org/10.1016/j.autcon. 2021.103682
  6. S. Naeem, M. Zubair, M. M. Ahmed, A. Ali, S. Anam (2023). Network security and cryptography challenges and trends on recent technologies. Journal of Applied and Emerging Sciences.13(1). https://journal.buitms.edu.pk/j/index.php/bj/article/view/546
  7. Mujiba, S., Estaq, A., Md, NUD., Md, TA. (2024). An optimizing business process: a comprehensive analysis of amazon inc.’s information architecture. European Journal of Engineering and Technology Research. 9(1). 47-58. https://doi.org/ 10.24018/ejeng.2024.9.1.3097
  8. Ratnadewi, Roy P. A, Yonatan H, Saleh A, & Setiawan M I. (2016).   Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). Journal of Physics. v954.  10.1088/1742-6596/954/1/012009

The contemporary landscape of cybersecurity is fraught with challenges, necessitating a keen understanding of evolving threats and robust defense mechanisms. By examining the Data Encryption Standard (DES) as a key element therein, this paper explores the complexities of cryptography, a foundational element of contemporary security paradigms. Securing confidential data from unwanted access is one of the many facets of cryptography, the art of secure communication. In the context of data protection, DES is recognized as a foundational cryptographic algorithm, valued for both its historical importance and ongoing applicability. But as technology moves more quickly and cyberattacks get more complex, DES's effectiveness is called into question, which has sparked debate about whether it is still sufficient in modern security scenarios. Here, in this paper we explore the complexities surrounding cryptography and DES, elucidating their strengths, limitations, and implications for cybersecurity practices. By examining current trends and emerging challenges, it endeavors to offer insights into mitigating risks and fortifying defenses against cyber threats in the digital age.

Keywords : Cryptography, Data Encryption Standard (DES), Advanced Encryption Standard (AES).

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe