Abstract
Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.
Original language | English |
---|---|
Pages (from-to) | 140-149 |
Number of pages | 10 |
Journal | International Journal of Computer Science |
Volume | 8 |
Issue number | 3 |
Publication status | Published - 2011 |