Multi-Level Based Cryptography Approach for Securing Messaging System

Authors

Omobolanle Esther Akinjisola

Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)

Lateef G. Salaudeen

Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)

Emmanuel Abiodun

Department of Computer Sciences, College of Natural and Applied Sciences, Chrisland University, Owode Road, Abeokuta, Ogun State (Nigeria)

Article Information

DOI: 10.51584/IJRIAS.2025.10120027

Subject Category: Social science

Volume/Issue: 10/12 | Page No: 339-351

Publication Timeline

Submitted: 2025-12-16

Accepted: 2025-12-24

Published: 2026-01-05

Abstract

This research addresses the growing challenge of cyberattacks targeting digital communications, such as unauthorized access and data theft, by proposing a secure messaging system based on advanced cryptography. The system employs a hybrid cryptographic approach, integrating RSA, DES, and AES algorithms. RSA, an asymmetric method, secures the exchange of symmetric keys, while DES and AES handle message encryption and decryption. By layering DES and AES, the system enhances robustness and resists potential attacks without sacrificing efficiency. Testing with textual data confirmed the system’s ability to uphold confidentiality, integrity, availability, and authenticity. The inclusion of AES strengthened encryption, improving resilience against cryptographic threats. Overall, the findings demonstrate that a multi-level cryptographic framework provides a practical and effective solution for applied secure messaging systems, particularly in environments requiring enhanced data protection.

Keywords

Cryptography, encryption, decryption, cryptosystem

Downloads

References

1. Alaa Hussein Al-Hamami& Ibrahem AbdallahAldariseh. (2012), Enhanced Method for RSACryptosystem Algorithm", 2012 InternationalConference on Advanced Computer ScienceApplications and Technologies (ACSAT) [Google Scholar] [Crossref]

2. Alowolodu O.D, Alese B.K, Adetunmbi A.O., Adewale O.S, and Ogundele O.S. (2013), Elliptic Curve Cryptography for Securing Cloud Computing Applications. International Journal of Computer Applications (0975 –8887)Volume 66–No.23 [Google Scholar] [Crossref]

3. Chaitanya, P. and Sree Y.R., (2012) “Design of New Security using Symmetric and Asymmetric Cryptography Algorithms”, World Journal of Science and Technology, Vol. 2, No. 10, pp. 83-88. [Google Scholar] [Crossref]

4. Kaliski, Burt, (1997). "Growing Up with Alice and Bob: Three Decades with the RSA Cryptosystem". https://en.wikipedia.org/wiki/RSA_Security#cite_note-kaliski-2 [Google Scholar] [Crossref]

5. Kalpana, P., and Singaraju, S., (2012) Data Security in Cloud Computing using RSA Algorithm”, NIST Special Publication, NIST SP – 800-144 [Google Scholar] [Crossref]

6. Moumita Mishra, Sayan Kumar Roy, AnweshaMukherjee, Debashis De, Soumya K. Ghosh,Rajkumar Buyya. (2019), An energy-aware multisensory geo-fog paradigm for mission criticalapplications", Journal of Ambient Intelligenceand Humanized Computing, https://link.springer.com/journal/12652 [Google Scholar] [Crossref]

7. Oyelade, O. J. and Isewon, Itunuoluwa and Oladipupo, O. O. and Famuyiwa, A (2014) Implementation of Secured Message Transmission using DES and RSA Cryptosystem. Covenant Journal of Informatics and Communication Technology (CJICT), 2 (2). pp. 75-88. [Google Scholar] [Crossref]

8. Paul Reid (2004). Biometrics for Network Security. Prentice Hall, ISBN: 0-13-101549-4 [Google Scholar] [Crossref]

9. Ravaei Niloo, (2018), Cryptography for Dummies — Part 2: The Caesar Cipher. https://medium.com/blockgeeks-blog/cryptography-for-dummies-part-2-the-caesar-cipher-665106afac78 [Google Scholar] [Crossref]

10. Rouse Margaret, (2018), Cryptography. CloudSecurity https://searchsecurity.techtarget.com/definition/cryptography [Google Scholar] [Crossref]

11. Shikha, K. and Ishank, K., (2013) “Data Security Using RSA Algorithm In MATLAB”, International Journal ofInnovative Research and Development, Vol. 2 Issue 7, page 479-483 [Google Scholar] [Crossref]

12. Sugumaran M., Murugan B. Bala, and Kamalraj D., (2014), An Architecture for Data Security in CloudComputing, 2014 World Congress onComputing and Communication Technologies, https://ieeexplore.ieee.org/xpl/conhome/6754623/proceeding [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles