[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

John Justin et al., 2012 - Google Patents

A survey on various encryption techniques

John Justin et al., 2012

View PDF
Document ID
16047259962304346318
Author
John Justin M
Manimurugan S
Publication year
Publication venue
International Journal of Soft Computing and Engineering (IJSCE) ISSN

External Links

Snippet

This paper focuses mainly on the different kinds of encryption techniques that are existing, and framing all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Similar Documents

Publication Publication Date Title
John Justin et al. A survey on various encryption techniques
Ntalianis et al. Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks
Soleymani et al. A survey on principal aspects of secure image transmission
Hua et al. Matrix-based secret sharing for reversible data hiding in encrypted images
Madhu et al. An overview of image security techiques
Yang et al. A visually meaningful image encryption scheme based on lossless compression spiht coding
Dongare et al. An efficient technique for image encryption and decryption for secured multimedia application
Fkirin et al. Two-level security approach combining watermarking and encryption for securing critical colored images
Parekh et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography
Kumar et al. An efficient and effective lossless symmetric key cryptography algorithm for an image
Naidu et al. Multilayer security in protecting and hiding multimedia data using cryptography and steganography techniques
Hussein et al. Protection of images by combination of vernam stream cipher, AES, and LSB steganography in a video clip
Jan et al. Logistic map-based image steganography using edge detection
CN113344762B (en) Double scrambling image encryption method based on AFD adaptive decomposition
Waziri et al. Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach
QASSIM et al. Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm
Radke et al. Review of Image Security Approaches: Concepts, issues, challenges and applications
Chinniyan et al. Image Steganography Using Deep Neural Networks.
Divya et al. Privacy preservation mechanism for the data used in image authentication
Deepthi et al. Pre Encryption Data Hiding Techniques using Reserving Room Approach
Ayoob et al. A new method for watermarking color images using virtual hiding and El-Gamal ciphering
Kaur et al. Steganography using RSA algorithm
Abdelmged et al. A Combined approach of steganography and cryptography technique based on parity checker and huffman encoding
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
Hua et al. Secure reversible data hiding in encrypted images using cipher-feedback secret sharing