Reference Hub1
Recent Developments in Cryptography: A Survey

Recent Developments in Cryptography: A Survey

ISBN13: 9781522529156|ISBN10: 1522529152|EISBN13: 9781522529163
DOI: 10.4018/978-1-5225-2915-6.ch001
Cite Chapter Cite Chapter

MLA

Balasubramanian, Kannan. "Recent Developments in Cryptography: A Survey." Algorithmic Strategies for Solving Complex Problems in Cryptography, edited by Kannan Balasubramanian and M. Rajakani, IGI Global, 2018, pp. 1-22. https://doi.org/10.4018/978-1-5225-2915-6.ch001

APA

Balasubramanian, K. (2018). Recent Developments in Cryptography: A Survey. In K. Balasubramanian & M. Rajakani (Eds.), Algorithmic Strategies for Solving Complex Problems in Cryptography (pp. 1-22). IGI Global. https://doi.org/10.4018/978-1-5225-2915-6.ch001

Chicago

Balasubramanian, Kannan. "Recent Developments in Cryptography: A Survey." In Algorithmic Strategies for Solving Complex Problems in Cryptography, edited by Kannan Balasubramanian and M. Rajakani, 1-22. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2915-6.ch001

Export Reference

Mendeley
Favorite

Abstract

The field of cryptography has seen enormous changes ever since the invention of Public Key Cryptography by Diffie and Hellman. The algorithms for complex problems like integer factorization, Discrete Logarithms and Elliptic Curve Discrete Logarithms have improved tremendously making way for attackers to crack cryptosystems previously thought were unsolvable. Newer Methods have also been invented like Lattice based cryptography, Code based cryptography, Hash based cryptography and Multivariate cryptography. With the invention of newer public Key cryptosystems, the signature systems making use of public key signatures have enabled authentication of individuals based on public keys. The Key Distribution mechanisms including the Key Exchange protocols and Public Key infrastructure have contributed to the development of algorithms in this area. This chapter also surveys the developments in the area of identity Based Cryptography, Group Based Cryptography and Chaos Based Cryptography.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.