,
Tom, Dr. Joshua J. http://orcid.org/0000-0001-9644-6805
P. Anebo, Dr. Nlerum
,
Onyekwelu, Dr. Bukola A. http://orcid.org/0000-0001-5040-5143
,
Wilfred, Adigwe http://orcid.org/0009-0007-2893-9342
,
E. Eyo, Richard http://orcid.org/0009-0004-4136-4350
,
Ethical Approval and Consent to Participate
: The article does not require ethical approval and consent to participate with evidence.
Authors Contributions
: Joshua J. Tom (Conceptualization of the project idea, analysis of quantum cryptographic algorithms, analysis of post quantum cryptographic techniques, project administration, Supervision, Visualization, Writing original abstract), Promise Nlerum (Writing conclusion, review of quantum computing concepts), Bukola A. Onyekwelu (Review of classical cryptographic algorithms, reformat of references), Wilfred Adigwe (Project administration, analysis of classical and post quantum algorithms), Richard E. Eyo (Search for related research papers, determination of relevance and review of classical algorithm.