A survey about the latest trends and research issues of cryptographic elements

Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some sch...

Full description

Saved in:
Bibliographic Details
Main Authors: Shoukat, Ijaz Ali, Abu Bakar, Kamalrulnizam, Iftikhar, Mohsin
Format: Article
Language:English
Published: International Journal of Computer Science Issues 2011
Subjects:
Online Access:http://eprints.utm.my/id/eprint/36326/1/IJCSI-8-3-2-140-149.pdf
http://eprints.utm.my/id/eprint/36326/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.