CHAT SIMULATOR USING AES ENCRYPTION
Main Article Content
Abstract
Smartphones have become an integral part the lives of individuals and their priorities The present moment. The most
visible uses are to chat and chat programs Most of these apps do does not provide the necessary protection and
privacy information exchanged between users. Chat apps have become one of the most important and popular
smartphone apps. It has the ability to exchange text messages, images and files that can freely communicate with each
other. All messages must be protected and in this paper the encryption to used for secure all messages is by using AES
encryption. AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely used to keep data
confidential in Internet networks. AES uses a block cipher with a block length of 128 bits and can encrypt data with
keys consisting of 128, 192, or 256 bits. AES is one of the strongest encryption algorithms available today. It has been
adopted by many organizations, including governments, banks, and technology companies. AES security is based on
mathematical complexity and is difficult to crack even on ultra-fast computers. The AES encryption process involves
multiple steps such as replace, move, and merge. The original data is split into smaller blocks and encrypted with the
provided key. The blocks then change periodically, complicating the data patterns an attacker might find
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
Sabah, N., Kadhim, J. M., & Dhannoon, B. N. (2017). Developing an End-to-End Secure
Chat Application Image processing View project image processing and Artificial
intelligence View project Developing an End-to-End Secure Chat Application. In IJCSNS
International Journal of Computer Science and Network Security (Vol. 17, Issue 11).
https://www.researchgate.net/publication/322509087
H. Ali, A., & Sagheer, A. M. (2017). Design of an Android Application for Secure Chatting.
International Journal of Computer Network and Information Security, 9(2), 29–35.
https://doi.org/10.5815/ijcnis.2017.02.04
Ali, A. H., & Sagheer, A. M. (2017). Design of Secure Chatting Application with End to End
Encryption for Android Platform. Iraqi Journal for Computers and Informatics, 43(1), 22–
https://doi.org/10.25195/2017/4315
Vashishtha, J. (2012). Evaluating the performance of Symmetric Key Algorithms: AES
(Advanced Encryption Standard) and DES (Data Encryption Standard). In IJCEM
International Journal of Computational Engineering & Management (Vol. 15).
www.IJCEM.orgIJCEMwww.ijcem.org
Sari, C. A., Rachmawanto, E. H., & Haryanto, C. A. (2018). Cryptography Triple Data
Encryption Standard (3DES) for Digital Image Security. Scientific Journal of Informatics,
(2), 2407–7658. http://journal.unnes.ac.id/nju/index.php/sji
Salama, D., Elminaam, A., Mohamed, H., Kader, A., & Hadhoud, M. M. (2010). Evaluating
The Performance of Symmetric Encryption Algorithms Higher Technological Institute 10th
of Ramadan City. In International Journal of Network Security (Vol. 10, Issue 3).
Ajagbe, S. A., Adesina, A. O., & Oladosu, J. B. (2019). EMPIRICAL EVALUATION OF
EFFICIENT ASYMMETRIC ENCRYPTION ALGORITHMS FOR THE PROTECTION
OF ELECTRONIC MEDICAL RECORDS (EMR) ON WEB APPLICATION.
International Journal of Scientific & Engineering Research, 10(5). http://orcid.org/0000-
-7010-5540http://www.ijser.org
International Journal of Application on Sciences, Technology and Engineering
(IJASTE)
Volume 1, Issue 3, 2023 ISSN:2987-2499
https://doi.org/10.24912/ijaste.v1.i3.931-940 940
Singh, S., & Attri, V. K. (2015). Dual Layer Security of data using LSB Image
Steganography Method and AES Encryption Algorithm. International Journal of Signal
Processing, Image Processing and Pattern Recognition, 8(5), 259–266.