Published May 30, 2025 | Version CC-BY-NC-ND 4.0
Journal article Open

Design and Development of a Secure Data Encryption and Decryption System

  • 1. Department of ICT, School of Engineering, Information and Communication University, Lusaka, ZAMBIA.

Description

Abstract: In an increasingly interconnected world, the need to secure sensitive information has become paramount. This article presents the Design and development of a secure data storage system. An encryption and decryption system aimed at enhancing the confidentiality, integrity, and availability of digital data. The proposed system employs advanced cryptographic algorithms to provide robust protection against unauthorised access, data breaches, and cyberattacks. The design phase emphasises the integration of both symmetric and asymmetric encryption techniques, enabling the system to cater to a diverse range of applications, from secure file storage to encrypted communications. Key Management protocols are implemented to ensure the safe generation, distribution, and storage of encryption keys, a critical component of secure systems. The system was developed using modern programming tools and frameworks, adhering to industry standards such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). Extensive testing was conducted to evaluate the system’s performance, security resilience, and scalability. Results demonstrate the system’s ability to resist common attacks, including brute force and cryptanalysis, while maintaining high efficiency in data processing. This research contributes to the field of data security by providing a versatile and secure solution that can be adapted for use in industries such as finance, healthcare, and e-commerce. Future work includes integrating post-quantum cryptographic algorithms to prepare for the advent of quantum computing.

Files

A143505010525.pdf

Files (583.1 kB)

Name Size Download all
md5:d1fa09e28e7fc202b07cb0f1ad31001c
583.1 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2025-05-15
Manuscript received on 13 February 2025 | First Revised Manuscript received on 20 February 2025 | Second Revised Manuscript received on 30 April 2025 | Manuscript Accepted on 15 May 2025 | Manuscript published on 30 May 2025.

References

  • Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal. (2023). Computational Intelligent Security in Wireless Communications. Edited By 1st Edition, 2023 p.p296. DOI: https://doi.org/10.1201/9781003323426
  • Baha Eldin Hamouda Hassan Hamouda (2020). Comparative Study of Different Cryptographic Algorithms (Journal of Information Security > Vol 11 No.3, July 2020). DOI: https://doi.org/10.4236/jis.2020.113009
  • Chen Ma (2024). Similarly, RSA encryption has contributed significantly to secure communications by employing asymmetric key techniques. November 2024 Applied and Computational Engineering 94(1):203-209. DOI: https://doi.org/10.54254/2755-2721/94/2024MELB0091
  • Rafiul Azim Jowarder, Sawgat Jahan (2024). Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection World Journal of Advanced Engineering Technology and Sciences 13 (1):330-339. DOI: https://doi.org/10.30574/wjaets.2024.13.1.0421
  • Banaeian Far Saeed, Imani Rad Azadeh (2024). Data Science and Management When cryptography stops data science: strategies for resolving the conflicts between data scientists and cryptographers Volume 7, Issue 3, September 2024, Pages 238-255. DOI: https://doi.org/10.1016/j.dsm.2024.03.001
  • Marie A Wright (2021). The Advanced Encryption Standard Network Security Volume 2001, Issue 10, 31 October 2001, Pages 11-13. DOI: https://doi.org/10.1016/S1353-4858(01)01018-2
  • Marin Ivezic (2017). Shor's Algorithm: A Quantum Threat to Modern Cryptography https://postquantum.com/post-quantum/
  • Annie Badman, Matthew Kosinski (2024). What is key management? https://www.ibm.com/think/topics/key-management
  • Rahul Raj, Yesem Kurt Peker, Zeynep Delal Mutlu 2 Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy. Electronics 2024, 13(15), 3050; DOI: https://doi.org/10.3390/electronics13153050
  • Simon Heron (2009). Encryption: Advanced Encryption Standard (AES) Network Security Volume 2009, Issue 12, December 2009, Pages 8-12. DOI: https://doi.org/10.1016/S1353-4858(10)70006-4
  • Manish Kumar (2022). Post-quantum cryptography Algorithm's standardization and performance analysis Array Volume 15, September 2022, 100242. DOI: https://doi.org/10.1016/j.array.2022.100242
  • Steven Tessler (2001). Data Model and Relational Database Design for the New England Water-Use Data System (NEWUDS). DOI: https://doi.org/10.3133/ofr01359
  • Joanna Bergström, Kasper Hornbæk (2025). DIRA: A model of the user interface International Journal of Human-Computer Studies Volume 193, January 2025, 103381. DOI: https://doi.org/10.1016/j.ijhcs.2024.103381
  • Tom, Dr. J. J., P. Anebo, Dr. N., Onyekwelu, Dr. B. A., Wilfred, A., & E. Eyo, R. (2023). Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems. In International Journal of Engineering and Advanced Technology (Vol. 12, Issue 5, pp. 25–38). DOI: https://doi.org/10.35940/ijeat.e4153.0612523
  • Shiny Irene D, G. Vamsi Krishna, Nalini M, Era of Quantum Computing- An Intelligent and Evaluation based on Quantum Computers. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 3S, pp. 615–619). DOI: https://doi.org/10.35940/ijrte.c1123.1083s19