Multi-Level Based Cryptography Approach for Securing Messaging System
Authors
Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)
Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)
Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)
Article Information
DOI: 10.51584/IJRIAS.2025.10120027
Subject Category: Social science
Volume/Issue: 10/12 | Page No: 339-351
Publication Timeline
Submitted: 2025-12-16
Accepted: 2025-12-24
Published: 2026-01-05
Abstract
This research addresses the growing challenge of cyberattacks targeting digital communications, such as unauthorized access and data theft, by proposing a secure messaging system based on advanced cryptography. The system employs a hybrid cryptographic approach, integrating RSA, DES, and AES algorithms. RSA, an asymmetric method, secures the exchange of symmetric keys, while DES and AES handle message encryption and decryption. By layering DES and AES, the system enhances robustness and resists potential attacks without sacrificing efficiency. Testing with textual data confirmed the system’s ability to uphold confidentiality, integrity, availability, and authenticity. The inclusion of AES strengthened encryption, improving resilience against cryptographic threats. Overall, the findings demonstrate that a multi-level cryptographic framework provides a practical and effective solution for applied secure messaging systems, particularly in environments requiring enhanced data protection.
Keywords
Cryptography, encryption, decryption, cryptosystem
Downloads
References
1. Alaa Hussein Al-Hamami& Ibrahem AbdallahAldariseh. (2012), Enhanced Method for RSACryptosystem Algorithm", 2012 InternationalConference on Advanced Computer ScienceApplications and Technologies (ACSAT) [Google Scholar] [Crossref]
2. Alowolodu O.D, Alese B.K, Adetunmbi A.O., Adewale O.S, and Ogundele O.S. (2013), Elliptic Curve Cryptography for Securing Cloud Computing Applications. International Journal of Computer Applications (0975 –8887)Volume 66–No.23 [Google Scholar] [Crossref]
3. Chaitanya, P. and Sree Y.R., (2012) “Design of New Security using Symmetric and Asymmetric Cryptography Algorithms”, World Journal of Science and Technology, Vol. 2, No. 10, pp. 83-88. [Google Scholar] [Crossref]
4. Kaliski, Burt, (1997). "Growing Up with Alice and Bob: Three Decades with the RSA Cryptosystem". https://en.wikipedia.org/wiki/RSA_Security#cite_note-kaliski-2 [Google Scholar] [Crossref]
5. Kalpana, P., and Singaraju, S., (2012) Data Security in Cloud Computing using RSA Algorithm”, NIST Special Publication, NIST SP – 800-144 [Google Scholar] [Crossref]
6. Moumita Mishra, Sayan Kumar Roy, AnweshaMukherjee, Debashis De, Soumya K. Ghosh,Rajkumar Buyya. (2019), An energy-aware multisensory geo-fog paradigm for mission criticalapplications", Journal of Ambient Intelligenceand Humanized Computing, https://link.springer.com/journal/12652 [Google Scholar] [Crossref]
7. Oyelade, O. J. and Isewon, Itunuoluwa and Oladipupo, O. O. and Famuyiwa, A (2014) Implementation of Secured Message Transmission using DES and RSA Cryptosystem. Covenant Journal of Informatics and Communication Technology (CJICT), 2 (2). pp. 75-88. [Google Scholar] [Crossref]
8. Paul Reid (2004). Biometrics for Network Security. Prentice Hall, ISBN: 0-13-101549-4 [Google Scholar] [Crossref]
9. Ravaei Niloo, (2018), Cryptography for Dummies — Part 2: The Caesar Cipher. https://medium.com/blockgeeks-blog/cryptography-for-dummies-part-2-the-caesar-cipher-665106afac78 [Google Scholar] [Crossref]
10. Rouse Margaret, (2018), Cryptography. CloudSecurity https://searchsecurity.techtarget.com/definition/cryptography [Google Scholar] [Crossref]
11. Shikha, K. and Ishank, K., (2013) “Data Security Using RSA Algorithm In MATLAB”, International Journal ofInnovative Research and Development, Vol. 2 Issue 7, page 479-483 [Google Scholar] [Crossref]
12. Sugumaran M., Murugan B. Bala, and Kamalraj D., (2014), An Architecture for Data Security in CloudComputing, 2014 World Congress onComputing and Communication Technologies, https://ieeexplore.ieee.org/xpl/conhome/6754623/proceeding [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- The Impact of Ownership Structure on Dividend Payout Policy of Listed Plantation Companies in Sri Lanka
- Urban Sustainability in North-East India: A Study through the lens of NER-SDG index
- Performance Assessment of Predictive Forecasting Techniques for Enhancing Hospital Supply Chain Efficiency in Healthcare Logistics
- The Fractured Self in Julian Barnes' Postmodern Fiction: Identity Crisis and Deflation in Metroland and the Sense of an Ending
- Impact of Flood on the Employment, Labour Productivity and Migration of Agricultural Labour in North Bihar