A General Purpose Cryptography Survey
نویسندگان
چکیده
For far too long an end-user’s interaction with an application using cryptography has been ignored. Cryptography needs to be simplified and evolve such that users do not need to know they are even using it. While the required user-input must remain minimal the difficulties related to securing communication must be resolved automatically. Ubiquitous encrypted communication will not occur until these issues are resolved and it becomes transparent for the end-user. We look at existing solutions to determine the desired requirements for a general-purpose cryptography solution.
منابع مشابه
Survey on Cryptographic Obfuscation
The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...
متن کاملHigh-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to the high level of security with relatively small keys provided by ECC. To sustain the high throughput required by applications like network servers, highspeed implementations of public-key...
متن کاملApplication of Identity-Based Cryptography in Mobile Ad Hoc Networks
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. To introduce the topic, we first review most important developments on general Identity-Based Cryptography. The survey introdu...
متن کاملSurvey and future trends of efficient cryptographic function implementations on GPGPUs
Many standard cryptographic functions are designed to benefit from hardware specific implementations. As a result, there have been a large number of highly efficient ASIC and FPGA hardware based implementations of standard cryptographic functions. Previously, hardware accelerated devices were only available to a limited set of users. General Purpose Graphic Processing Units (GPGPUs) have become...
متن کاملFUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR
A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...
متن کامل