A Survey about Latest Trends and Research Issues in Cryptographic Elements

Ijaz Ali Shoukat, Kamalrulnizam Abu Bakar, Mohsin Iftikhar

Research output: Contribution to journalArticle

Abstract

Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.
Original languageEnglish
Pages (from-to)140-149
Number of pages10
JournalInternational Journal of Computer Science
Volume8
Issue number3
Publication statusPublished - 2011

Fingerprint

Cryptography

Cite this

Shoukat, Ijaz Ali ; Bakar, Kamalrulnizam Abu ; Iftikhar, Mohsin. / A Survey about Latest Trends and Research Issues in Cryptographic Elements. In: International Journal of Computer Science. 2011 ; Vol. 8, No. 3. pp. 140-149.
@article{34f35faad6e140c6ac986ff4f1a230b1,
title = "A Survey about Latest Trends and Research Issues in Cryptographic Elements",
abstract = "Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.",
author = "Shoukat, {Ijaz Ali} and Bakar, {Kamalrulnizam Abu} and Mohsin Iftikhar",
note = "Imported on 12 Apr 2017 - DigiTool details were: Journal title (773t) = International Journal of Computer Science. ISSNs: 1694-0814;",
year = "2011",
language = "English",
volume = "8",
pages = "140--149",
journal = "International Journal of Computer Science",
issn = "1694-0814",
publisher = "IJCSI Press",
number = "3",

}

A Survey about Latest Trends and Research Issues in Cryptographic Elements. / Shoukat, Ijaz Ali; Bakar, Kamalrulnizam Abu; Iftikhar, Mohsin.

In: International Journal of Computer Science, Vol. 8, No. 3, 2011, p. 140-149.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A Survey about Latest Trends and Research Issues in Cryptographic Elements

AU - Shoukat, Ijaz Ali

AU - Bakar, Kamalrulnizam Abu

AU - Iftikhar, Mohsin

N1 - Imported on 12 Apr 2017 - DigiTool details were: Journal title (773t) = International Journal of Computer Science. ISSNs: 1694-0814;

PY - 2011

Y1 - 2011

N2 - Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.

AB - Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.

M3 - Article

VL - 8

SP - 140

EP - 149

JO - International Journal of Computer Science

JF - International Journal of Computer Science

SN - 1694-0814

IS - 3

ER -