Data encryption methodologies for information Security: A systematic review

Keywords: encryption, security, information, innovation

Abstract

In today's digital environment, data encryption has emerged as one of the most effective techniques for ensuring information security and privacy. This paper presents a systematic review using the PRISMA methodology, analyzing various journals published between 2021 and 2025. After a rigorous selection process, we selected 15 publications, which were included in this article for review. The results show that traditional algorithms such as AES, RSA, and ECC remain highly effective in standard environments; however, new proposals such as enhanced elliptic curve cryptography (EECC), probabilistic encryption, and hybrid schemes offer significant improvements in security and adaptability. Notable contributions included AES variants that enhance the avalanche effect, hybrid cloud schemes that reduce data recovery times compared to conventional methods, and techniques applied to image encryption that improve robustness against differential attacks. However, these emerging solutions present limitations related to increased computational resource consumption and increased processing times, which restricts their application in environments with limited capacities or high real-time demands. This work provides a comprehensive view of the benefits and limitations of encryption in digital information security.

Downloads

Download data is not yet available.

References

ElAzzaby et al. 2023, Color image encryption using a Zigzag Transformation and sine–cosine maps, Scientific African, vol 22. https://doi.org/10.1016/j.sciaf.2023.e01955
Hafiz et al., 2022, Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality, IEEE Access, vol. 10.
https://ieeexplore.ieee.org/document/9895258
Kalaiselvi R,Vennila S, 2021, Security enhancement using custom-aes and its performance evaluation on avalanche effect-a new approach, Indian Journal of Computer Science and Engineering, 12(3), 591-597 https://doi.org/10.21817/indjcse/2021/v12i3/211203092
Khalid et al.,2023, Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach, Baghdad Science Journal, vol 20, 2593-2607.
https://doi.org/10.21123/bsj.2023.8715
Korchynskyi et al., 2023, Method of information protection based on the integration of probabilistic encryption and noise immune coding, Radioelectronic and Computer Systems, 4(108), 184-196
https://doi.org/10.32620/REKS.2023.4.13
Meselhy et al., 2025, Multiple image encryption techniques: Strategies, challenges, and potential future directions, Alexandria Engineering Journal, vol 125.
https://doi.org/10.1016/j.aej.2025.04.006
Mustafa et al., 2022, Financial information security using hybrid encryption technique on multi-cloud architecture, Bulletin of Electrical Engineering and Informatics, 11(6), 3450-3461.
https://doi.org/10.11591/eei.v11i6.3967
Nadeem et al. 2022, An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms, Computers, Materials and Continua, 74(2). https://doi.org/10.32604/cmc.2023.032882
Naimur et al. 2024, Highly secured and effective management of app-based online voting system using RSA encryption and decryption, Heliyon, 10(3). https://doi.org/10.1016/j.heliyon.2024.e25373
Priyadarsini et al.,2023. Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map, Computers, Materials and Continua, 74(3)
https://doi.org/10.32604/cmc.2023.030648
Wahab et al.,2021 , Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques, IEEE Access, vol. 9, pp. 31805-31815. https://ieeexplore.ieee.org/document/9356603/authors#authors
Fauziyah et al., (2024, enero 17), A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security. Computers, Materials & Continua, 78(3), 4417-4452. https://doi.org/10.32604/cmc.2024.046797
Yousheng et al. 2024, TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy, Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2024.03.005
Zafir et al. 2024, Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques, Internet of Things, vol. 28. https://doi.org/10.1016/j.iot.2024.101357
Zhengqi Zhang, Yan Zhao, Enhanced Elliptic Curve, 2024, Cryptography (EECC), Procedia Computer Science, vol 247. https://doi.org/10.1016/j.procs.2024.10.158
Published
2025-12-15