Comparative Analysis of Cryptographic Algorithms and the Impact of Quantum Computing on Cybersecurity


Authors : Mahmidul Hasan; Arifur Rahaman; Yeakob Ali; Sabrina Tasnim

Volume/Issue : Volume 10 - 2025, Issue 10 - October


Google Scholar : https://tinyurl.com/5783wv2w

Scribd : https://tinyurl.com/ynurdmmj

DOI : https://doi.org/10.38124/ijisrt/25oct096

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : In today's world, information is an asset, and preserving that asset has become a challenge. And there is no alternative to cryptography for preserving this information. Cryptography is used to ensure data security, so that third parties cannot steal, change or modify any data. It converts information from plain text to cipher text with the help of various algorithms, which are not easily readable or make any sense to normal human beings. The cipher text can be decrypted if its algorithm can be reverse-engineered to solve the mathematical equation. Currently, due to the development of our technology, our computer processors are getting faster, as a result, ordinary computers are also getting more powerful. Quantum computers are completing their work in a very fast time. Currently, Google has invented a chip “Willow”. With this chip, they have solved a complex calculation or calculation (computing problem) in five minutes which would take conventional computer millions of years, and if artificial intelligence is added to it, then our information decoding and encoding algorithm will solve the equation in a few moments. As we know there are three branches of cryptography Symmetric, Asymmetric and Hash cryptography. Symmetric cryptography is currently very weak. The algorithms of the remaining two cryptographies will be very quickly compromised by quantum computers. This paper also highlights the key exchange, flexibility and security challenges of various cryptography, which determine the effectiveness of cryptographic systems, and the future state of cryptography will be discussed in comparison with quantum computers.

Keywords : Cryptography, Symmetric, Asymmetric, Hash Algorithm, RSA, Diffie-Hellman, Blowfish, MD5, SHA-512, Cyber Security, Information Security, Data Protection.

References :

  1. William, S. (1999). Cryptography and network security: principles and practice, Prentice-Hall, Inc
  2. https://academickids.com/encyclopedia/index.php/Data_Encryption_Standard#google_vignette
  3. https://www.geeksforgeeks.org/advanced-encryption-standard-aes/
  4. The RSA Algorithm by Evgeny Milanov. Publish 3 June 2009
  5. Diffie-Hellman:Key Exchange and Public Key Cryptosystems by Sivanagaswathi Kallam , Master of science Math and Computer Science Department Indiana State University TerreHaute,IN,USA (9/30/2015)
  6. R. Rivest, MIT Laboratory for Computer Science and RSA Data Security, Inc. (April 1992)
  7. A comparative study of Message Digest 5(MD5) and SHA256 algorithm D Rachmawati1* , J T Tarigan1* and A B C Ginting 1* 1Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Medan 20155, Indonesia
  8. SHA-512/256 by 1. Shay Gueron (Department of Mathematics, University of Haifa, Israel), 2. Simon Johnson ( Mobility Group, Intel Corporation, Israel Development Center, Haifa, Israel), 3 . Jesse Walker ( Intel Architecture Group, Intel Corporation, USA 4 Security Research Lab, Intel Labs, Intel Corporation, USA)
  9. Figure 1 - uploaded by Marcelo Lubaszewski, https://www.researchgate.net/figure/Block-diagram-of-DES-algorithm_fig1_220850878
  10. Fig 6 - uploaded by Muhammad Faheem Mushtaq , https://www.researchgate.net/figure/Advanced-Encryption-Standard-AES-Algorithm_fig5_321587376
  11. Security in quantum cryptography; Christopher Portmann∗ Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland. Renato Renner† Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland

In today's world, information is an asset, and preserving that asset has become a challenge. And there is no alternative to cryptography for preserving this information. Cryptography is used to ensure data security, so that third parties cannot steal, change or modify any data. It converts information from plain text to cipher text with the help of various algorithms, which are not easily readable or make any sense to normal human beings. The cipher text can be decrypted if its algorithm can be reverse-engineered to solve the mathematical equation. Currently, due to the development of our technology, our computer processors are getting faster, as a result, ordinary computers are also getting more powerful. Quantum computers are completing their work in a very fast time. Currently, Google has invented a chip “Willow”. With this chip, they have solved a complex calculation or calculation (computing problem) in five minutes which would take conventional computer millions of years, and if artificial intelligence is added to it, then our information decoding and encoding algorithm will solve the equation in a few moments. As we know there are three branches of cryptography Symmetric, Asymmetric and Hash cryptography. Symmetric cryptography is currently very weak. The algorithms of the remaining two cryptographies will be very quickly compromised by quantum computers. This paper also highlights the key exchange, flexibility and security challenges of various cryptography, which determine the effectiveness of cryptographic systems, and the future state of cryptography will be discussed in comparison with quantum computers.

Keywords : Cryptography, Symmetric, Asymmetric, Hash Algorithm, RSA, Diffie-Hellman, Blowfish, MD5, SHA-512, Cyber Security, Information Security, Data Protection.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe