Comparative Insights into State-of-the-Art Cryptographic Techniques and Design Approaches
DOI:
https://doi.org/10.70454/IJMRE.2025.50409Keywords:
Data Security, Cryptography Algorithm, Symmetric, Asymmetric, Encryption, DecryptionAbstract
The modern communication technology has experienced huge changes with the rapid growth of the Internet. This expansion has made human beings more dependent on it, but has also raised security issues during information exchange. While being transferred over a public network, attackers may monitor and capture the data packets if they are unencrypted. Consequently, the communication process may be interrupted and intercepted. Attackers can combine multiple methods to grab the transmitted data. Therefore, security of information is imperative prior transmission. Cryptography is a security measure to make data unintelligible to intruders. Numerous research studies have been conducted over the decades to introduce a variety of cryptography methods. Additionally, a number of analyses have been carried out to determine the optimal encryption technique based on specific characteristics, each with its own shortcomings. This prompts individuals to implement robust security measures. This paper provides a comprehensive analysis of contemporary cryptography methods, while also reviewing several existing related research efforts.
References
[1] Salami, Y., Khajevand, V., and Zeinali, E. (2023). Cryptographic algorithms: a review of the literature, weaknesses and open challenges. J. Comput. Robot, 16(2), 46–56.
[2] Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z. A., Shakir, N. S. A., and Deris, M. M. (2017). A survey on the cryptographic encryption algorithms. International Journal of Advanced Computer Science and Applications, 8(11).
[3]Hossain, M. A., Hossain, M. B., Uddin, M. S., and Imtiaz, S. M. (2016). Performance analysis of different cryptography algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).
[4] Maqsood, F., Ahmed, M., Ali, M. M., and Shah, M. A. (2017). Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, 8(6).
[5] Qadir, A. M. and Varol, N. (2019). A review paper on cryptography. In 2019 7th international symposium on digital forensics and security (ISDFS), 1–6. IEEE.
[6] Alegro, J. K. P., Arboleda, E. R., Perena, M. R., and Dellosa, R. M. (2019). Hybrid schnorr, rsa, and aes cryptosystem. Int. J. Sci. Technol. Res, 8(10), 1777–1781.
[7] Agrawal, A. and Patankar, G. (2016). Design of hybrid cryptography algorithm for secure communication. International Research Journal of Engineering and Technology (IRJET), 3(01), 1323–1326.
[8] Mohua, M. M. A., Ameen, A., Saif, A., Aktar, N., and Sakib, M. N. (2025). A novel remote desktop protocol data security approach using hybrid cryptographic algorithm and unsupervised neural network. In 2025 4th International Conference on Computing and Information Technology (ICCIT), 377–382, IEEE.
[9] Al-Shabi, M. A. (2019). A survey on symmetric and asymmetric cryptography algorithms in information security. International Journal of Scientific and Research Publications (IJSRP), 9(3), 576–589.
[10] Anwar, M. N. B., Hasan, M., Hasan, M. M., Loren, J. Z., and Hossain, S. (2019). Comparative study of cryptography algorithms and its’ applications. International Journal of Computer Networks and Communications Security, 7(5), 96–103.
[11] Mohua, M. M. A. (2025). A Review on the Integration of Cryptography and Steganography for Enhanced Information Security. International Journal of Scientific Research in Multidisciplinary Studies, 11(8), 51–60.
[12] Naeem, B., Senapati, B., Sudman, M. S. I., and AbdelRehim, W. M. (2023). Hybrid architecture for secure data communication within the private cloud.
[13] Naidu, D., Tirpude, S., Kalyani, K., Bongir-war, V., and Sharma, T. (2020). Data hiding using meaningful encryption algorithm to enhance data security. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 2408–2413.
[14] Tayal, S., Gupta, N., Gupta, P., Goyal, D., and Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763–770.
[15] Chaloop, S. G. and Abdullah, M. Z. (2021). Enhancing hybrid security approach using aes and rsa algorithms. Journal of Engineering and Sustainable Development, 25(4), 58–66.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Most. Mazriha Akter Mohua (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
This is an Open Access article distributed under the term's of the Creative Common Attribution 4.0 International License permitting all use, distribution, and reproduction in any medium, provided the work is properly cited.
