Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes

S. Priya
2012 The Smart Computing Review  
Data protection from attackers has become essential now-a-days. This protection can be achieved using encryption. There are many encryption standards available. There are different techniques available to achieve high speed and low power, and to increase security. This paper focuses mainly on the different methods of encryption techniques that are available and presents a comparative survey of all the implementation techniques. It also provides information about the various methods for image
more » ... ryption and bio-cryptography. Secure Access is an asymmetric algorithm. Table 1 shows a comparison of various cryptography symmetric algorithms in terms of network, round of operation, block size, and key size. The AES algorithm is very difficult to crack and is well suitable to security service applications. It is designed in a way that has better resistance against existing attacks. AES has more elegant mathematical formulas behind it and requires only one pass to encrypt data [2]. It has very low memory requirements [3], so it is particularly well-suited to embedded applications such as smart cards. The AES algorithm consists of a 128-block length and supports key lengths of 128, 192, and 256 bits. The AES algorithm has three units: encryption, decryption, and key expansion.
doi:10.6029/smartcr.2012.06.001 fatcat:zcxbrg6bnnhh5gopupeoonqz6y