A survey about the latest trends and research issues of cryptographic elements
Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some sch...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Journal of Computer Science Issues
2011
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/36326/1/IJCSI-8-3-2-140-149.pdf http://eprints.utm.my/id/eprint/36326/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information. |
---|