An efficient algorithm for text encryption on android devices
In the era of digital communication, ensuring the confidentiality and integrity of sensitive information is paramount. This dissertation introduces a robust text encryption system that combines the strengths of Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to create a hybrid encryption approach. Object Oriented Design (OOD) was used for the design methodology. The proposed system leverages the efficiency of AES for symmetric key encryption and the security benefits of RSA for key exchange and digital signatures. The encryption process begins with the generation of a random symmetric key for each communication session, which is then used for the AES encryption of the plaintext. The symmetric key is subsequently encrypted using the recipient's RSA public key, ensuring secure key exchange. This hybrid approach harnesses the speed of AES for bulk data encryption while utilizing RSA's asymmetric encryption for the secure sharing of secret keys. The system incorporates digital signatures generated using RSA to authenticate the sender and verify the integrity of the encrypted message. This dual-layered encryption strategy not only safeguards the confidentiality of the message but also provides assurance of the message origin and integrity. The implementation of this hybrid AES-RSA encryption system using Python programming language offers a versatile solution suitable for diverse communication channels, including email, messaging platforms, and file transfers. Its robustness against common cryptographic attacks makes it an ideal choice for securing sensitive information in various applications, such as financial transactions, healthcare communication, and government data exchange. The experimental results demonstrate the efficacy of the proposed system, with significantly reduced encryption and decryption times—0.5005 seconds and 0.5003 seconds, respectively—when compared to existing systems. This noteworthy improvement in processing speed enhances the system's practical applicability for real-time communication scenarios.
Abduljabbar, R., Hamid, O., & Alhyani, N. (2021). Features of genetic algorithm for plain text encryption. International Journal of Electrical and Computer Engineering (Ijece), 11(1), 434.
Adiono, T. & Tandiawan, B. (2018). Device protocol design for security on internet of things based smart home. International Journal of Online Engineering (Ijoe), 14(07), 161.
Belkaid, B., Mourad, L., & Cherifi, M. (2015). Meteosat images encryption based on aes and rsa algorithms. International Journal of Advanced Computer Science and Applications, 6(6).
Chuman, T. & Kiya, H. (2018). Security evaluation for block scrambling-based image encryption including jpeg distortion against jigsaw puzzle solver attacks. Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences, E101.A (12), 2405-2408.
Dong, J. (2023). Design of network security optimization encryption algorithm. https://doi.org/10.1117/12.2681604
H, A., W, B., E, A., & Siregar, R. (2018). Performance analysis of aes-blowfish hybrid algorithm for security of patient medical record data. Journal of Physics Conference Series, 1007, 012018.
Hammawa, M., Bisallah, H., & Abdulrahman, A. (2023). Enriching information security via hybrid of new expand rivest shamir adleman and data encryption standard cryptosystem. Journal of Applied Sciences and Environmental Management, 27(1), 155-160.
Kafarnawi, M. (2021). Asymmetric encryption method proposed for arabic letters using artificial neural networks. Basic and Applied Sciences - Scientific Journal of King Faisal University, 1-7.
Kumar, B., Boaddh, J., & Mahawar, L. (2016). A hybrid security approach based on aes and rsa for cloud data. International Journal of Advanced Technology and Engineering Exploration, 3(17), 43-49.
Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Acm, 21(2), 120-126.
Shaikh, A. & Kaul, V. (2014). Enhanced security algorithm using hybrid encryption and ecc. Iosr Journal of Computer Engineering, 16(3), 80-85.
Shawkat, S. and Barazanchi, I. (2022). A proposed model for text and image encryption using different techniques. Telkomnika (Telecommunication Computing Electronics and Control), 20(4), 858.
Shende*, V. (2019). A comp r ehensive evaluation and i mplementation of aes, rsa and hybrid cryptographic algorithms on a portable device. International Journal of Engineering and Advanced Technology, 9(1), 4771-4774.
Copyright (c) 2024 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.