Cryptographic Techniques for Data Privacy Preservation: A Review

Main Article Content

Hivi Kamal Zebari
Wafaa Mustafa Abduallah

Abstract

Protecting our personal and sensitive information is more important than ever in today's online world. Cryptographic techniques are key tools that use math to convert our data into secret codes, making sure only the right people can read it. These methods help keep our information safe from hackers and unauthorized access. This paper explores the crucial role of cryptographic techniques in preserving data privacy in the digital age. There are several types of cryptographic techniques. Symmetric-key encryption uses one key to both lock and unlock data, while asymmetric-key encryption uses two keys, one for locking and another for unlocking. More advanced methods, like homomorphic encryption, allow data to be used without being decrypted, keeping it secure even when it's being processed. Secure multi-party computation lets multiple people work with data together while keeping their own data private. These techniques are essential for protecting sensitive information in areas like healthcare, banking, and online communications. By using cryptography, organizations can meet legal requirements and prevent data breaches. Cryptography ensures that data stays private and hasn't been altered, which builds trust and security in our digital interactions. This paper covers these techniques and highlights their importance in our interconnected world.

Article Details

How to Cite
Cryptographic Techniques for Data Privacy Preservation: A Review. (2025). East Journal of Applied Science, 1(1), 40-53. https://doi.org/10.63496/ejas.Vol1.Iss1.50
Section
Articles

How to Cite

Cryptographic Techniques for Data Privacy Preservation: A Review. (2025). East Journal of Applied Science, 1(1), 40-53. https://doi.org/10.63496/ejas.Vol1.Iss1.50