Design and Development of a Secure Data Encryption and Decryption System
Main Article Content
Abstract
In an increasingly interconnected world, the need to secure sensitive information has become paramount. This article presents the Design and development of a secure data storage system. An encryption and decryption system aimed at enhancing the confidentiality, integrity, and availability of digital data. The proposed system employs advanced cryptographic algorithms to provide robust protection against unauthorised access, data breaches, and cyberattacks. The design phase emphasises the integration of both symmetric and asymmetric encryption techniques, enabling the system to cater to a diverse range of applications, from secure file storage to encrypted communications. Key Management protocols are implemented to ensure the safe generation, distribution, and storage of encryption keys, a critical component of secure systems. The system was developed using modern programming tools and frameworks, adhering to industry standards such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). Extensive testing was conducted to evaluate the system’s performance, security resilience, and scalability. Results demonstrate the system’s ability to resist common attacks, including brute force and cryptanalysis, while maintaining high efficiency in data processing. This research contributes to the field of data security by providing a versatile and secure solution that can be adapted for use in industries such as finance, healthcare, and e-commerce. Future work includes integrating post-quantum cryptographic algorithms to prepare for the advent of quantum computing.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal. (2023). Computational Intelligent Security in Wireless Communications. Edited By 1st Edition, 2023 p.p296. DOI: https://doi.org/10.1201/9781003323426
Baha Eldin Hamouda Hassan
Hamouda (2020). Comparative
Study of Different Cryptographic Algorithms (Journal of Information Security > Vol 11 No.3, July 2020). DOI: https://doi.org/10.4236/jis.2020.113009
Chen Ma (2024). Similarly, RSA encryption has contributed significantly to secure communications by employing asymmetric key techniques. November 2024 Applied
and Computational Engineering 94(1):203-209. DOI: https://doi.org/10.54254/2755-2721/94/2024MELB0091
Rafiul Azim Jowarder, Sawgat Jahan (2024). Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection World Journal of Advanced Engineering Technology and Sciences 13 (1):330-339. DOI: https://doi.org/10.30574/wjaets.2024.13.1.0421
Banaeian Far Saeed, Imani Rad Azadeh (2024). Data Science and Management When cryptography stops data science: strategies for resolving the conflicts between data scientists and cryptographers Volume 7, Issue 3, September 2024, Pages 238-255. DOI: https://doi.org/10.1016/j.dsm.2024.03.001
Marie A Wright (2021). The Advanced Encryption Standard Network Security Volume 2001, Issue 10, 31 October 2001, Pages 11-13. DOI: https://doi.org/10.1016/S1353-4858(01)01018-2
Marin Ivezic (2017). Shor’s Algorithm: A Quantum Threat to Modern Cryptography https://postquantum.com/post-quantum/
Annie Badman, Matthew Kosinski (2024). What is key management? https://www.ibm.com/think/topics/key-management
Rahul Raj, Yesem Kurt Peker, Zeynep Delal Mutlu 2 Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy. Electronics 2024, 13(15), 3050; DOI: https://doi.org/10.3390/electronics13153050
Simon Heron (2009). Encryption: Advanced Encryption Standard (AES) Network Security Volume 2009, Issue 12, December 2009, Pages 8-12. DOI: https://doi.org/10.1016/S1353-4858(10)70006-4
Manish Kumar (2022). Post-quantum cryptography Algorithm's standardization and performance analysis Array Volume 15, September 2022, 100242. DOI: https://doi.org/10.1016/j.array.2022.100242
Steven Tessler (2001). Data Model and Relational Database Design for the New England Water-Use Data System (NEWUDS). DOI: https://doi.org/10.3133/ofr01359
Joanna Bergström, Kasper Hornbæk (2025). DIRA: A model of the user interface International Journal of Human-Computer Studies Volume 193, January 2025, 103381. DOI: https://doi.org/10.1016/j.ijhcs.2024.103381
Tom, Dr. J. J., P. Anebo, Dr. N., Onyekwelu, Dr. B. A., Wilfred, A., & E. Eyo, R. (2023). Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems. In International Journal of Engineering and Advanced Technology (Vol. 12, Issue 5, pp. 25–38). DOI: https://doi.org/10.35940/ijeat.e4153.0612523
Shiny Irene D, G. Vamsi Krishna, Nalini M, Era of Quantum Computing- An Intelligent and Evaluation based on Quantum Computers. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 3S, pp. 615–619). DOI: https://doi.org/10.35940/ijrte.c1123.1083s19