Cryptographic Algorithms and Protocols: Evolution and Future Trend
DOI:
https://doi.org/10.47392/IRJAEM.2025.0354Keywords:
Encryption, Digital Signature Algorithms, Protocols for Cryptography, Encryption and decryption using symmetric and asymmetric keysAbstract
This chapter provides a thorough analysis of cryptographic protocols and algorithms, tracing their development from antiquated to contemporary approaches and predicting emerging developments. It starts with some basic definitions and emphasizes how cryptography uses mathematical operations to encrypt and decrypt data in order to guarantee data secrecy, integrity, and validity. The historical progression demonstrates how the development of symmetric key algorithms (like DES, AES) and asymmetric key algorithms (like RSA, ECC)—driven by advances in computing power and the growing complexity of security threats—replaced simpler encryption techniques like substitution ciphers. The drawbacks of existing cryptographic systems are discussed, such as processing costs, difficulties managing keys, susceptibility to side-channel attacks, sophisticated computational attacks (such as quantum computing), and implementation errors. It responds by outlining precautionary steps that include using strong algorithms, putting strong key management procedures in place, following best practices in cryptography, and making sure that implementation is secure through code reviews and security assessments.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Research Journal on Advanced Engineering and Management (IRJAEM)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
.