Authors :
Mahmidul Hasan; Arifur Rahaman; Yeakob Ali; Sabrina Tasnim
Volume/Issue :
Volume 10 - 2025, Issue 10 - October
Google Scholar :
https://tinyurl.com/5783wv2w
Scribd :
https://tinyurl.com/ynurdmmj
DOI :
https://doi.org/10.38124/ijisrt/25oct096
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
In today's world, information is an asset, and preserving that asset has become a challenge. And there is no
alternative to cryptography for preserving this information. Cryptography is used to ensure data security, so that third
parties cannot steal, change or modify any data. It converts information from plain text to cipher text with the help of various
algorithms, which are not easily readable or make any sense to normal human beings. The cipher text can be decrypted if
its algorithm can be reverse-engineered to solve the mathematical equation. Currently, due to the development of our
technology, our computer processors are getting faster, as a result, ordinary computers are also getting more powerful.
Quantum computers are completing their work in a very fast time. Currently, Google has invented a chip “Willow”. With
this chip, they have solved a complex calculation or calculation (computing problem) in five minutes which would take
conventional computer millions of years, and if artificial intelligence is added to it, then our information decoding and
encoding algorithm will solve the equation in a few moments. As we know there are three branches of cryptography
Symmetric, Asymmetric and Hash cryptography. Symmetric cryptography is currently very weak. The algorithms of the
remaining two cryptographies will be very quickly compromised by quantum computers. This paper also highlights the key
exchange, flexibility and security challenges of various cryptography, which determine the effectiveness of cryptographic
systems, and the future state of cryptography will be discussed in comparison with quantum computers.
Keywords :
Cryptography, Symmetric, Asymmetric, Hash Algorithm, RSA, Diffie-Hellman, Blowfish, MD5, SHA-512, Cyber Security, Information Security, Data Protection.
References :
- William, S. (1999). Cryptography and network security: principles and practice, Prentice-Hall, Inc
- https://academickids.com/encyclopedia/index.php/Data_Encryption_Standard#google_vignette
- https://www.geeksforgeeks.org/advanced-encryption-standard-aes/
- The RSA Algorithm by Evgeny Milanov. Publish 3 June 2009
- Diffie-Hellman:Key Exchange and Public Key Cryptosystems by Sivanagaswathi Kallam , Master of science Math and Computer Science Department Indiana State University TerreHaute,IN,USA (9/30/2015)
- R. Rivest, MIT Laboratory for Computer Science and RSA Data Security, Inc. (April 1992)
- A comparative study of Message Digest 5(MD5) and SHA256 algorithm D Rachmawati1* , J T Tarigan1* and A B C Ginting 1* 1Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Medan 20155, Indonesia
- SHA-512/256 by 1. Shay Gueron (Department of Mathematics, University of Haifa, Israel), 2. Simon Johnson ( Mobility Group, Intel Corporation, Israel Development Center, Haifa, Israel), 3 . Jesse Walker ( Intel Architecture Group, Intel Corporation, USA 4 Security Research Lab, Intel Labs, Intel Corporation, USA)
- Figure 1 - uploaded by Marcelo Lubaszewski, https://www.researchgate.net/figure/Block-diagram-of-DES-algorithm_fig1_220850878
- Fig 6 - uploaded by Muhammad Faheem Mushtaq , https://www.researchgate.net/figure/Advanced-Encryption-Standard-AES-Algorithm_fig5_321587376
- Security in quantum cryptography; Christopher Portmann∗ Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland. Renato Renner† Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland
In today's world, information is an asset, and preserving that asset has become a challenge. And there is no
alternative to cryptography for preserving this information. Cryptography is used to ensure data security, so that third
parties cannot steal, change or modify any data. It converts information from plain text to cipher text with the help of various
algorithms, which are not easily readable or make any sense to normal human beings. The cipher text can be decrypted if
its algorithm can be reverse-engineered to solve the mathematical equation. Currently, due to the development of our
technology, our computer processors are getting faster, as a result, ordinary computers are also getting more powerful.
Quantum computers are completing their work in a very fast time. Currently, Google has invented a chip “Willow”. With
this chip, they have solved a complex calculation or calculation (computing problem) in five minutes which would take
conventional computer millions of years, and if artificial intelligence is added to it, then our information decoding and
encoding algorithm will solve the equation in a few moments. As we know there are three branches of cryptography
Symmetric, Asymmetric and Hash cryptography. Symmetric cryptography is currently very weak. The algorithms of the
remaining two cryptographies will be very quickly compromised by quantum computers. This paper also highlights the key
exchange, flexibility and security challenges of various cryptography, which determine the effectiveness of cryptographic
systems, and the future state of cryptography will be discussed in comparison with quantum computers.
Keywords :
Cryptography, Symmetric, Asymmetric, Hash Algorithm, RSA, Diffie-Hellman, Blowfish, MD5, SHA-512, Cyber Security, Information Security, Data Protection.