1 Department of Computer Science; Stephen F. Austin State University; Nacogdoches; Texas; USA.
2 Department of Multidisciplinary Studies, College and Liberal Arts; Stephen F. Austin State University; Nacogdoches; Texas, USA.
3 Center for financial studies, Charter institute of Bankers of Nigeria, Victoria Island, Lagos, Nigeria.
World Journal of Advanced Research and Reviews, 2025, 25(02), 1916-1924
Article DOI: 10.30574/wjarr.2025.25.2.0434
Received on 29 December 2024; revised on 10 February 2025; accepted on 13 February 2025
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and health care ensuring that the confidentiality and integrity of data is maintained while also addressing the current need for continuing resistance to future quantum attacks. Additionally, this review discusses critical problems in implementation, usability, and the threat that quantum computing poses to existing cryptographic techniques and offers insights into quantum resistant algorithms.
Cryptography; Data privacy; Quantum attacks; Data protection; Data security; lattice-based cryptography; code-based cryptography; multi-variate polynomial cryptography
Preview Article PDF
Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi and Peter Chimee Oyirinnaya. A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions. World Journal of Advanced Research and Reviews, 2025, 25(02), 1916-1924. Article DOI: https://doi.org/10.30574/wjarr.2025.25.2.0434.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0