Next-generation cryptographic techniques for robust network security

Himmat Rathore *

DISYS Solutions Inc, Texas, USA.
 
Research Article
World Journal of Advanced Research and Reviews, 2021, 11(03), 496–508
Article DOI: 10.30574/wjarr.2021.11.3.0413
 
Publication history: 
Received on 25 July 2021; revised on 19 September 2021; accepted on 23 September 2021
 
Abstract: 
Cryptography is a key enabling tool in digital security that is needed to protect information, secure communication, and ensure the integrity between connected networks. As cybersecurity threats continue to emerge constantly and, as evidenced by APTs, ransomware, and, later, quantum cyber threats, the need for stronger, more modern generations of cryptographic methods is more urgent than ever. Therefore, this paper seeks to discuss the emerging trends in the most recent cryptographic advancements including post quantum cryptography, homomorphic cryptography and security paradigms leveraging on blockchain system. These techniques are equally effective in correcting significant limitations of existing systems and in improving their overall efficiency and rates.
The coursework points out the inherent weaknesses of traditional cryptographic solutions, such as the exposure to quantum computing threat models and their ability to address current and future security needs. Through a brief discussion of the theoretical background and practical implementations, this paper aims to assess the efficiency of the latest cryptographic technologies in strengthening network security measures.
Research insights show that using third-generation cryptographic approaches is far more effective in protecting information from new risks. Besides, applying these methods in essential industries, including finance, healthcare, and IoT, supports the practical utilization of these methods. Based on the findings of this research, these innovations should be adopted to secure digital structure in a growing complex environment.
 
Keywords: 
RSA Algorithm; Quantum Threats; Blockchain Security; Ransomware; Internet of Things; Cryptography
 
Full text article in PDF: 
Share this