The Future of Cryptography and Encryption Techniques
R. Ramakrishnan1, M. Gowthomen Raj2, J. Hareesh3
1Associate Professor, Department of Master of Computer Application, Sri Manakula Vinayagar Engineering College, Puducherry – 605 107. India
ramakrishanamca@smvec.ac.in
2 Student, Department of Master of Computer Application, Sri Manakula Vinayagar Engineering College, Puducherry – 605 107. India
gowthomenrajmca@gmail.com
3Student, Department of Master of Computer Application, Sri Manakula Vinayagar Engineering College, Puducherry – 605 107. India
haresshmasters@gmail.com
ABSTRACT:
As the importance of information security grows in our digitally connected world, the field of cryptography and encryption techniques continues to expand at a rapid pace. This review paper looks at the future of cryptography, highlighting cutting-edge advances and emerging paradigms that have the potential to revolutionized the industry. The paper begins with a discussion of post-quantum cryptography, which addresses the immediate threat that quantum computers represent to standard encryption techniques. Post-quantum cryptography entails creating new encryption techniques that are immune to quantum computer attacks. The paper examines lattice-based encryption, code-based cryptography, multivariate cryptography, and other promising techniques that have demonstrated resistance to quantum attacks.
With the development of technology and the sophistication of data security threats, cryptography and encryption methods have a bright future. This essay examines future advancements in the area and the effects they might have on secure communication and data protection.
The requirement for quantum-resistant cryptography is the first topic covered. Traditional cryptography algorithms may become susceptible as quantum computing develops, requiring the development of new encryption techniques that can withstand quantum attacks. Among the possible techniques that could be used are multivariate cryptography, lattice-based cryptography, and code-based encryption.
As a crucial piece of technology, homomorphic encryption permits computations on encrypted data without the need for decryption. This capacity creates opportunities for safe data processing in industries like healthcare, finance, and government.
KEY WORDS: Cryptography, Encryption, Confidentiality, Integrity, Validity