A Survey on Various Encryption Techniques
John Justin M1, Manimurugan S2
1John Justin.M, PG Research Scholar,Image Processing Group,Karunya University,Coimbatore,India.
2Manimurugan.S, Assistant Professor,Dept of Computer Science and Technology, Karunya University,Coimbatore,India.
Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 429-432 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0473022112 /2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This paper focuses mainly on the different kinds of encryption techniques that are existing, and framing all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also focuses on image encryption techniques, information encryption techniques, double encryption and Chaos-based encryption techniques. This study extends to the performance parameters used in encryption processes and analyzing on their security issues.
Keywords: Chaotic Encryption, Double Encryption, Image Encryption, Information Encryption.