Abstract

In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography in the development of information technology for secure file storage. Hybrid cryptography, combining symmetric and asymmetric encryption, offers robust protection against unauthorized access, tampering, and data loss. The article reviews recent cryptography literature, highlighting the importance of secure file storage in today's interconnected world and examining the benefits of hybrid cryptography. The analysis of articles on cryptography reveals emerging trends and challenges. Post-quantum cryptography addresses concerns about quantum threats, while blockchain-based cryptography enhances security in IoT data sharing. Homomorphic encryption enables computations on encrypted data, and privacy-preserving cryptographic protocols facilitate secure multi-party computation. Machine learning's intersection with cryptanalysis introduces efficiency but raises ethical considerations. The paper further discusses advancements and trends in cryptography techniques, including post-quantum cryptography, homomorphic encryption, zero-knowledge proofs, post-quantum key exchange, secure multi-party computation, and post-quantum signature schemes. These developments aim to ensure long-term security against quantum attacks, enable privacy-preserving computations, and enhance the confidentiality, integrity, and authentication of digital communication and data storage. In conclusion, the paper advocates for the adoption of hybrid cryptography in secure file storage systems. Its combination of symmetric and asymmetric encryption, along with its adaptability to evolving security landscapes, positions hybrid cryptography as a formidable approach to data protection. By embracing hybrid cryptography and staying informed about the latest advancements, organizations can navigate the digital age with confidence, ensuring the confidentiality, integrity, and availability of stored files.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call