Design and Development of a Secure Data Encryption and Decryption System

Main Article Content

Shepherd Mwaekwa Wamulume

Abstract

In an increasingly interconnected world, the need to secure sensitive information has become paramount. This article presents the Design and development of a secure data storage system. An encryption and decryption system aimed at enhancing the confidentiality, integrity, and availability of digital data. The proposed system employs advanced cryptographic algorithms to provide robust protection against unauthorised access, data breaches, and cyberattacks. The design phase emphasises the integration of both symmetric and asymmetric encryption techniques, enabling the system to cater to a diverse range of applications, from secure file storage to encrypted communications. Key Management protocols are implemented to ensure the safe generation, distribution, and storage of encryption keys, a critical component of secure systems. The system was developed using modern programming tools and frameworks, adhering to industry standards such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). Extensive testing was conducted to evaluate the system’s performance, security resilience, and scalability. Results demonstrate the system’s ability to resist common attacks, including brute force and cryptanalysis, while maintaining high efficiency in data processing. This research contributes to the field of data security by providing a versatile and secure solution that can be adapted for use in industries such as finance, healthcare, and e-commerce. Future work includes integrating post-quantum cryptographic algorithms to prepare for the advent of quantum computing.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Shepherd Mwaekwa Wamulume , Tran., “Design and Development of a Secure Data Encryption and Decryption System”, IJCNS, vol. 5, no. 1, pp. 20–27, May 2025, doi: 10.54105/ijcns.A1435.05010525.
Section
Articles

How to Cite

[1]
Shepherd Mwaekwa Wamulume , Tran., “Design and Development of a Secure Data Encryption and Decryption System”, IJCNS, vol. 5, no. 1, pp. 20–27, May 2025, doi: 10.54105/ijcns.A1435.05010525.
Share |

References

Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal. (2023). Computational Intelligent Security in Wireless Communications. Edited By 1st Edition, 2023 p.p296. DOI: https://doi.org/10.1201/9781003323426

Baha Eldin Hamouda Hassan

Hamouda (2020). Comparative

Study of Different Cryptographic Algorithms (Journal of Information Security > Vol 11 No.3, July 2020). DOI: https://doi.org/10.4236/jis.2020.113009

Chen Ma (2024). Similarly, RSA encryption has contributed significantly to secure communications by employing asymmetric key techniques. November 2024 Applied

and Computational Engineering 94(1):203-209. DOI: https://doi.org/10.54254/2755-2721/94/2024MELB0091

Rafiul Azim Jowarder, Sawgat Jahan (2024). Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection World Journal of Advanced Engineering Technology and Sciences 13 (1):330-339. DOI: https://doi.org/10.30574/wjaets.2024.13.1.0421

Banaeian Far Saeed, Imani Rad Azadeh (2024). Data Science and Management When cryptography stops data science: strategies for resolving the conflicts between data scientists and cryptographers Volume 7, Issue 3, September 2024, Pages 238-255. DOI: https://doi.org/10.1016/j.dsm.2024.03.001

Marie A Wright (2021). The Advanced Encryption Standard Network Security Volume 2001, Issue 10, 31 October 2001, Pages 11-13. DOI: https://doi.org/10.1016/S1353-4858(01)01018-2

Marin Ivezic (2017). Shor’s Algorithm: A Quantum Threat to Modern Cryptography https://postquantum.com/post-quantum/

Annie Badman, Matthew Kosinski (2024). What is key management? https://www.ibm.com/think/topics/key-management

Rahul Raj, Yesem Kurt Peker, Zeynep Delal Mutlu 2 Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy. Electronics 2024, 13(15), 3050; DOI: https://doi.org/10.3390/electronics13153050

Simon Heron (2009). Encryption: Advanced Encryption Standard (AES) Network Security Volume 2009, Issue 12, December 2009, Pages 8-12. DOI: https://doi.org/10.1016/S1353-4858(10)70006-4

Manish Kumar (2022). Post-quantum cryptography Algorithm's standardization and performance analysis Array Volume 15, September 2022, 100242. DOI: https://doi.org/10.1016/j.array.2022.100242

Steven Tessler (2001). Data Model and Relational Database Design for the New England Water-Use Data System (NEWUDS). DOI: https://doi.org/10.3133/ofr01359

Joanna Bergström, Kasper Hornbæk (2025). DIRA: A model of the user interface International Journal of Human-Computer Studies Volume 193, January 2025, 103381. DOI: https://doi.org/10.1016/j.ijhcs.2024.103381

Tom, Dr. J. J., P. Anebo, Dr. N., Onyekwelu, Dr. B. A., Wilfred, A., & E. Eyo, R. (2023). Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems. In International Journal of Engineering and Advanced Technology (Vol. 12, Issue 5, pp. 25–38). DOI: https://doi.org/10.35940/ijeat.e4153.0612523

Shiny Irene D, G. Vamsi Krishna, Nalini M, Era of Quantum Computing- An Intelligent and Evaluation based on Quantum Computers. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 3S, pp. 615–619). DOI: https://doi.org/10.35940/ijrte.c1123.1083s19

Most read articles by the same author(s)

1 2 > >>