Loading

Design and Development of a Secure Data Encryption and Decryption System
Shepherd Mwaekwa Wamulume

Shepherd Mwaekwa Wamulume, Department of ICT, School of Engineering, Information and Communication University, Lusaka, ZAMBIA.

Manuscript received on 13 February 2025 | First Revised Manuscript received on 20 February 2025 | Second Revised Manuscript received on 30 April 2025 | Manuscript Accepted on 15 May 2025 | Manuscript published on 30 May 2025 | PP: 20-27 | Volume-5 Issue-1, May 2025 | Retrieval Number: 100.1/ijcns.B143004021124 | DOI: 10.54105/ijcns.A1435.05010525

Open Access | Ethics and Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Published by Lattice Science Publication (LSP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In an increasingly interconnected world, the need to secure sensitive information has become paramount. This article presents the Design and development of a secure data storage system. An encryption and decryption system aimed at enhancing the confidentiality, integrity, and availability of digital data. The proposed system employs advanced cryptographic algorithms to provide robust protection against unauthorised access, data breaches, and cyberattacks. The design phase emphasises the integration of both symmetric and asymmetric encryption techniques, enabling the system to cater to a diverse range of applications, from secure file storage to encrypted communications. Key Management protocols are implemented to ensure the safe generation, distribution, and storage of encryption keys, a critical component of secure systems. The system was developed using modern programming tools and frameworks, adhering to industry standards such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). Extensive testing was conducted to evaluate the system’s performance, security resilience, and scalability. Results demonstrate the system’s ability to resist common attacks, including brute force and cryptanalysis, while maintaining high efficiency in data processing. This research contributes to the field of data security by providing a versatile and secure solution that can be adapted for use in industries such as finance, healthcare, and e-commerce. Future work includes integrating post-quantum cryptographic algorithms to prepare for the advent of quantum computing.

Keywords: Cryptographic, Symmetric, Asymmetric Encryption, AES, RSA.
Scope of the Article: Encryption Algorithms