Performance and Security Trade-offs in Keyless Data Encryption and Decryption

Authors

  • Haider Abbas Preston University (Islamabad Campus) of Pakistan Author
  • Malik Sikandar Hayat Khiyal Preston University (Islamabad campus) of Pakistan Author
  • Muhammad Daud Awan Preston University (Islamabad Campus) of Pakistan Author

DOI:

https://doi.org/10.63075/6mgd6f45

Keywords:

 Keyless encryption, Physical Layer Security (PLS), Keyless User Defined Optimal Security (KUDOS), All-or-Nothing Transform (AONT), Wiretap channel, Secrecy capacity, Biometric cryptography, Chaos-based image encryption, Quantum-resilient security, Secrecy-Reliability Performance Trade-off (SRPT), Internet of Things (IoT) security, 6G networks

Abstract

Traditional cryptographic systems heavily depend on secure key management, distribution, and storage, creating vulnerabilities that become critical in the face of quantum computing threats and complex network environments. This paper explores keyless data encryption and decryption paradigms that derive security from intrinsic properties of communication channels, data context, physical environments, or biological traits, eliminating the need for pre-shared or stored keys. Drawing on information-theoretic foundations such as Shannon's perfect secrecy and Wyner's wiretap channel model, the review examines key architectural modalities, including Physical Layer Security (PLS) techniques (e.g., artificial noise injection and unshared secret key generation in 5G/6G networks), the Keyless User Defined Optimal Security (KUDOS) algorithm for memory context protection, All-or-Nothing Transforms (AONT) combined with information dispersal for distributed storage, biometric-based fuzzy vault schemes, chaos-based image encryption, and emerging quantum-resilient AI-integrated frameworks like QSAFE-MM1.A detailed analysis of performance-security trade-offs reveals inherent tensions, such as the Secrecy-Reliability Performance Trade-off (SRPT) in NOMA systems, energy efficiency constraints in IoT environments, computational overhead in fully homomorphic encryption, and acceptance-rate declines in biometric systems with increasing polynomial complexity. While keyless approaches offer advantages in reduced attack surface, lower latency, and quantum resistance, they demand careful balancing against reliability, throughput, energy consumption, and scalability limitations.The findings underscore the shift toward adaptive, hybrid security architectures that integrate physical randomness, AI-driven monitoring, and context-aware mechanisms to achieve robust, future-proof protection in heterogeneous digital ecosystems.

 

 

Downloads

Download data is not yet available.

Downloads

Published

2026-01-23

Issue

Section

Computer Science

How to Cite

Performance and Security Trade-offs in Keyless Data Encryption and Decryption. (2026). Annual Methodological Archive Research Review, 4(1), 32-46. https://doi.org/10.63075/6mgd6f45

Similar Articles

1-10 of 790

You may also start an advanced similarity search for this article.