Cryptographic Algorithms and Protocols: Evolution and Future Trend

Authors

  • Tejesh Raju Peruri UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author
  • Rajesh Jujjuvarapu UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author
  • Rishi Macha UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author
  • Rishi Macha UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author
  • Dinesh Balusu UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author
  • Hari Nagendra Nerusu UG – Cyber Security, Ramachandra college Engineering, Eluru, Andhra Pradesh, India. Author

DOI:

https://doi.org/10.47392/IRJAEM.2025.0354

Keywords:

Encryption, Digital Signature Algorithms, Protocols for Cryptography, Encryption and decryption using symmetric and asymmetric keys

Abstract

This chapter provides a thorough analysis of cryptographic protocols and algorithms, tracing their development from antiquated to contemporary approaches and predicting emerging developments. It starts with some basic definitions and emphasizes how cryptography uses mathematical operations to encrypt and decrypt data in order to guarantee data secrecy, integrity, and validity. The historical progression demonstrates how the development of symmetric key algorithms (like DES, AES) and asymmetric key algorithms (like RSA, ECC)—driven by advances in computing power and the growing complexity of security threats—replaced simpler encryption techniques like substitution ciphers. The drawbacks of existing cryptographic systems are discussed, such as processing costs, difficulties managing keys, susceptibility to side-channel attacks, sophisticated computational attacks (such as quantum computing), and implementation errors. It responds by outlining precautionary steps that include using strong algorithms, putting strong key management procedures in place, following best practices in cryptography, and making sure that implementation is secure through code reviews and security assessments.

Downloads

Download data is not yet available.

Downloads

Published

2025-06-24