A survey about the latest trends and research issues of cryptographic elements

Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each has its own affirmative and feeble characteristics. Some schemes carry the use of long bits key and some support the use of small key. Practical cryptosystems are either symmetric or asymmetric in nature. In this painstaking gaze, the accurate selection of right encryption scheme matters for desired information swap to meet enhanced security objectives. This survey compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. In addition, this study introduces two new encryption selection constrains (section 4.1) which are neglected in previous studies. Finally this comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.

[1]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[2]  P. V. Oorschot Overview of Cryptography , .

[3]  Rishab Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..

[4]  Tianjie Cao,et al.  Research of Chaotic Block Cipher Algorithm Based on Logistic Map , 2009, 2009 Second International Conference on Intelligent Computation Technology and Automation.

[5]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[6]  Tianjie Cao,et al.  Survey: Image Encryption using Chaotic Cryptography Schemes , 2011 .

[7]  Ratna Dutta,et al.  Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..

[8]  Mayank Mishra,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .

[9]  Vashitva Kumar Srivastava,et al.  A Symmetric Key Cryptographic Algorithm , 2012 .

[10]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[11]  W. Z. Gandhare,et al.  Survey of Visual Cryptography Schemes , 2010 .

[12]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[13]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[14]  Piya Techateerawat A Review on Quantum Cryptography Technology , 2010 .

[15]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[16]  R. Balasubramaniam,et al.  BioCryptosystems for Authentication and Network Security-A Survey , 2010 .

[17]  Masayuki Kanda,et al.  Year 2010 Issues on Cryptographic Algorithms , 2007 .

[18]  David A. Cooper,et al.  Quantum resistant public key cryptography: a survey , 2009, IDtrust '09.

[19]  Burton S. Kaliski A survey of encryption standards , 1993, IEEE Micro.

[20]  Marianne M. Swanson,et al.  Standards for Security Categorization of Federal Information and Information Systems , 2004 .

[21]  L. W. Hawkes,et al.  An Application of Visual Cryptography To Financial Documents , 2000 .

[22]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .