SlideShare a Scribd company logo
An Understanding And Perspectives of END
TO END ENCRYPTION
Presented by
Kailasshaji
S7 cse B
1
End-to-end encryption is a security measure that ensures the confidentiality and integrity
of data transmitted between two or more parties
It involves encrypting the data at the sender's end and decrypting it at the receiver's
end, making it unreadable to any intermediaries or unauthorized entities who may try to
intercept or access the data during transmission.
End to End Encryption
2
PROCESS OF END TO END ENCRYPTION
Encryption: The data is encrypted using a cryptographic algorithm at the sender's device before it is transmitted. This encryption
converts the data into an unreadable format, known as ciphertext.
Transmission: The encrypted data is then transmitted over a network, such as the internet, to the intended recipient. During this
transmission, the data remains encrypted and cannot be understood by anyone who intercepts it.
Decryption: Upon reaching the recipient's device, the encrypted data is decrypted using a corresponding decryption key. This
process converts the ciphertext back into its original readable format, known as plaintext
Key Management: To ensure secure communication, end-to-end encryption requires the use of encryption keys. These keys are
generated and securely exchanged between the sender and recipient. Only the authorized parties possess the necessary keys to
encrypt and decrypt the data.
Security Assurance: End-to-end encryption provides a high level of security by ensuring that the data remains encrypted
throughout the entire transmission process. It protects against eavesdropping, data tampering, and unauthorized access by third
parties.
3
Cryptographic Algorithms
Advance Encryption Standard (AES}
Blow fish
Data Encryption Standard (DES)
Hybrid (AES - RSA)
Triple Data Encryption Standard (3DES)
4
CRYPTOGRAPHY
Cryptography is the practice and study of techniques used to secure
communication and data from unauthorized access or modification.
It involves the use of mathematical algorithms and principles to convert plain
text into an unreadable format, known as ciphertext, and vice versa.
The main objectives of cryptography are confidentiality, integrity,
authentication, and non-repudiation.
5
01 Encryption is the process of converting plaintext (readable
data) into ciphertext (unreadable data) using an algorithm
and a secret key. This ensures that even if the ciphertext is
intercepted, it cannot be understood without the
corresponding decryption key.
02 Decryption is the reverse process of encryption. It involves
converting ciphertext back into plaintext using the correct
decryption key. Only authorized parties with the correct
key can decrypt the ciphertext and access the original
data.
Decryption
03 Symmetric cryptography, also known as secret-key
cryptography, uses the same key for both encryption and
decryption. The sender and receiver must share the secret
key securely before communication can take place.
Symmetric Cryptography
04 Asymmetric cryptography, also known as public-key cryptography, uses
a pair of mathematically related keys: a public key for encryption and a
private key for decryption. The public key can be freely shared, while
the private key must be kept secret. This allows for secure
communication without the need to exchange secret keys beforehand.
Asymmetric Cryptography
05 Hash functions are cryptographic algorithms that take an
input (message) and produce a fixed-size output called a
hash value or digest. Hash functions are used to verify the
integrity of data, as even a small change in the input will
result in a completely different hash value.
Hash Functions
06 Cryptography relies on secure key management practices
to ensure the confidentiality and integrity of data. This
includes generating strong keys, securely distributing and
storing them, and regularly updating them to maintain
security.
Key Management
Encryption
6
SYMMETRIC ENCRYPTION ALGORITHM
In symmetric Encryption Algorithm a single encryption key is used in the encryption and decryption
process
The Encryption Key is conveyed to the sender and the recepient before the encryption /decription
process
So the Encryption key is vital and its strength is configent on its length
7
8
EXAMPLES OF SYMMETRIC ENCRYPTION
ALGORITHM
RC2
RC5
Advance Encryption Standard
Blowfish
Data Encription Standard (DES)
Hyrid (AES-RSA)
Triple Data Encryption Standard (3DES)
9
The Data Encryption Standard (DES) is a symmetric-key block cipher
DES operates on fixed-size blocks of data, and each block is 64 bits long.
The key length in DES is 56 bits
DES was considered secure for many years, but due to advances in computing
power, it is now vulnerable to brute-force attacks
Data Encryption Standard (DES)
10
64-bit plaintext
Initial permutation
Round 1
Round 2
Round 16
Final permutation
64-bit ciphertext
K₁
48-bit
K₂
48-bit
K16
48-bit
Round-key
generator
DES
-56-bit cipher key
Structure of Data Encryption Standard
11
Initial key is passed through a permutation function
Round key is produces for 15 round of operation by
Permutation is same for all rounds but different key
the combination of left circular shift and permutation
produced because of the repeated shifts of key bit
12
Triple Data Encryption Standard (3DES)
This is a process in through which data is encrypted using 56 bit two keys
Its process follows EDE model , which says data must be sequentially encrypted
twice and decrypted once.
It encrypts using one encryption key, then decrypts using a different encryption
key, and finally encrypts using same encryption key
For encryption, EDE uses only 168-bit out of 192-bits keys
13
Advances Encryption Standard (AES)
AES was established as a federal standard by the National Institute of Standards and Technology (NIST)
in 2001
AES is a symmetric-key algorithm
AES supports key lengths of 128, 192, and 256 bits. The security strength of AES is directly related to
the key length, and longer keys provide higher security.
AES uses a substitution-permutation network (SPN) structure.
The decryption process for AES is the inverse of the encryption process.
AES is widely considered secure and has withstood extensive cryptanalysis. Its security is based on the
choice of key length
14
No of Rounds
Key size
(in bits)
10 128
12 192
14 256
Advanced Encryption Standard Structure
15
AES-128 AES-192 AES-256
Key Size 128 192 256
Plaintext Size 128 128 128
Number of rounds 10 12 14
Round Key Size 128 128 128
Advanced Encryption Standard Parameters
16
Blowfish
Blowfish is a symmetric-key block cipher algorithm that was designed by Bruce Schneier in
1993
It is widely used for encryption and decryption of data. Blowfish operates on 64-bit blocks
and supports key sizes ranging from 32 bits to 448 bits.
It is known for its simplicity, speed, and security
17
Assymetric algorithm
In asymmetric encryption algorithms, two types of keys called Private keys and Public Keys, are
utilized.
The recipient’s public key is used to produce a ciphertext from the plaintext.. Then the ciphertext
can only be decrypts using the recipient’s private key
The private key is known by the authorized person only. But the public key is stored in the
public domain for ease of assess
Examples are Digital Signatures, Rivest-Shamir-Adleman (RSA) and so on
18
Asymmetric Encryption Process
19
Rivest-Shamir-Adleman (RSA) Algorithm
Invented byRivest-Shamir-Adleman
This is based on number theory, using two prime numbers or mathematical operation to
randomly produce the public and private keys
The public key (which is public) is used for encryption, and the private key (which is private)
is used for decryption
Sender encrypts the communication using public key of the recipient and when the
communication is received, the recipient can decrypt it with its private key
C= M^e mod n
M= C^d mod n
20
Hybrid Encryption Algorithm
Hybrid encryption is a blend of symmetric and asymmetric encryption methods
In a hybrid encryption scheme, data is encrypted using a symmetric key algorithm, and the
symmetric key itself is protected by asymmetric encryption
Hybrid encryption is commonly used in various secure communication protocols, including SSL/TLS
for secure web browsing and PGP (Pretty Good Privacy) for secure email communication.
21
Methodology
The work proposes to ascertain which cryptographic algorithm is best suited for End-To-
End Encryption security.
By carrying out a performance evaluation analysis on various cryptographic
algorithms; such as 3DES, DES, AES, Blowfish and Hybrid (AES-RSA).
The following performance evaluation parameters such as encryption time, different
key size, CPU utilization, memory consumption rate and overall process time, would be
utilized
22
Specify
data to encrypt
or decrypt
DATA PHASE
Generate results
from each
algorithm based
on performance
REPORT PHASE
Select algorithm
to process
encryption or
decryption
ALGORITHM PHASE
Microsoft Excel
Simulation Parameters
Data Phase
Algorithm Phase
Report Phase
23
Performance Evaluation Parameters
The performance evaluation parameters used to analysis comparatively the use case cryptographic
algorithms below
Encryption and Decryption Time
Different Key Length (Size)
CPU Utilization Time Period
Memory Consumption Rate
Overall Process Time
24
File name File sizes
Text 400, 1500, 2048, 3000 (bytes)
Image 400, 1500, 2048, 3000 (kb)
Audio 26.1(Mb)
SIMULATION IMPLEMENTATION
PyCharm IDE for windows applications was utilized to compile the simulation using the interpreter settings.
And also, to implement the algorithms in python programing language
The packages utilized are Ecryptography PyCryptodome Psutil
The sizes of the input files used are shown in Table below and consists of text, images and audio
25
RESULTS OF EXPERIMENT
The results illustrate the effect of varying data sizes and the effect of encryption/decryption mode for each
use case cryptographic algorithms
While the audio file was used to ascertain the memory rate, CPU utilization, and overall process time.
The overall result is transferred to Microsoft excel for more investigation and graphs plotted in Chart 1 –
Chart 8 for each resourced measured
18
27
28
Discussion of findings
From the experimental results above, advanced encryption standard (AES) performed best in comparison
to other algorithms
But in terms of security, hybrid encryption is more secure combining the speed benefit of AES algorithm
and security and key management benefit of RSA algorithm
29
CONCLUSION AND RECOMMENDATION
The research highlights the critical importance of selecting the right cryptographic algorithm for End-To-End Encryption security
While AES is efficient, its limitations in key management led to the exploration of a Hybrid (AES-RSA) approach
The hybrid solution, leveraging the strengths of both AES and RSA, emerged as a more secure and versatile option, especially in
scenarios involving bidirectional communication
The findings emphasize the need for a nuanced understanding of cryptographic algorithms and their implications for secure digital
communication.
30
REFERENCES
Ohwo Onome Blaise, Oludele Awodele, Odunayo Yewande, "An Understanding and Perspectives of End-To-End
Encryption", International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 4, April 2021
Ben Lutkevich, Madelyn Bacon, "What is End-to-End Encryption (E2EE) and How does it work?", Available at:
https://www.techtarget.com
What Is Data Encryption: Types, Algorithms, Techniques and Methods, Available at: https://www.simplilearn.com
RSA Algorithm with example and mod calculation, Available at: https://youtu.be/y5dPfW3I9Aw?si=FYh7NJmoAtqihlLx
31
THANK YOU
32

More Related Content

PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPT
Encryption
PPTX
Symmetric--Cipher-Model-An-Overview.pptx
PPTX
Encryption in Cryptography
PPTX
Encryption33.pptx
PDF
A Survey On The Cryptographic Encryption Algorithms
PPTX
Data encryption
PPTX
Introduction to Cryptography for btech cse
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Encryption
Symmetric--Cipher-Model-An-Overview.pptx
Encryption in Cryptography
Encryption33.pptx
A Survey On The Cryptographic Encryption Algorithms
Data encryption
Introduction to Cryptography for btech cse

Similar to An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf (20)

PPTX
Encryption techniques
PPTX
IS-cryptograpy algorithms.pptx
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PDF
IRJET- Comparative Analysis of Encryption Techniques
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
PDF
International Journal of Engineering Research and Development (IJERD)
PPT
Cryptography
PPTX
Seminar on Encryption and Authenticity
PDF
Analysis of Cryptographic Algorithms for Network Security
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
UNIT 3 Information Security Sharad Institute
DOCX
Cryptography
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PPT
6. cryptography
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
White Paper on Cryptography
PPTX
Unit 7 : Network Security
PPT
Cyber security Unit 3 Cryptography and Network security
PPTX
Networking Advance Concepts with handson experience
Encryption techniques
IS-cryptograpy algorithms.pptx
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
IRJET- Comparative Analysis of Encryption Techniques
A Review on Various Most Common Symmetric Encryptions Algorithms
International Journal of Engineering Research and Development (IJERD)
Cryptography
Seminar on Encryption and Authenticity
Analysis of Cryptographic Algorithms for Network Security
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
UNIT 3 Information Security Sharad Institute
Cryptography
A Survey on Generation and Evolution of Various Cryptographic Techniques
6. cryptography
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
White Paper on Cryptography
Unit 7 : Network Security
Cyber security Unit 3 Cryptography and Network security
Networking Advance Concepts with handson experience
Ad

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
additive manufacturing of ss316l using mig welding
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPT
introduction to datamining and warehousing
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Total quality management ppt for engineering students
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Artificial Intelligence
PPTX
Geodesy 1.pptx...............................................
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
737-MAX_SRG.pdf student reference guides
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
UNIT 4 Total Quality Management .pptx
Mechanical Engineering MATERIALS Selection
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
additive manufacturing of ss316l using mig welding
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Safety Seminar civil to be ensured for safe working.
introduction to datamining and warehousing
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Total quality management ppt for engineering students
Current and future trends in Computer Vision.pptx
Artificial Intelligence
Geodesy 1.pptx...............................................
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
737-MAX_SRG.pdf student reference guides
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
III.4.1.2_The_Space_Environment.p pdffdf
UNIT 4 Total Quality Management .pptx
Ad

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf

  • 1. An Understanding And Perspectives of END TO END ENCRYPTION Presented by Kailasshaji S7 cse B 1
  • 2. End-to-end encryption is a security measure that ensures the confidentiality and integrity of data transmitted between two or more parties It involves encrypting the data at the sender's end and decrypting it at the receiver's end, making it unreadable to any intermediaries or unauthorized entities who may try to intercept or access the data during transmission. End to End Encryption 2
  • 3. PROCESS OF END TO END ENCRYPTION Encryption: The data is encrypted using a cryptographic algorithm at the sender's device before it is transmitted. This encryption converts the data into an unreadable format, known as ciphertext. Transmission: The encrypted data is then transmitted over a network, such as the internet, to the intended recipient. During this transmission, the data remains encrypted and cannot be understood by anyone who intercepts it. Decryption: Upon reaching the recipient's device, the encrypted data is decrypted using a corresponding decryption key. This process converts the ciphertext back into its original readable format, known as plaintext Key Management: To ensure secure communication, end-to-end encryption requires the use of encryption keys. These keys are generated and securely exchanged between the sender and recipient. Only the authorized parties possess the necessary keys to encrypt and decrypt the data. Security Assurance: End-to-end encryption provides a high level of security by ensuring that the data remains encrypted throughout the entire transmission process. It protects against eavesdropping, data tampering, and unauthorized access by third parties. 3
  • 4. Cryptographic Algorithms Advance Encryption Standard (AES} Blow fish Data Encryption Standard (DES) Hybrid (AES - RSA) Triple Data Encryption Standard (3DES) 4
  • 5. CRYPTOGRAPHY Cryptography is the practice and study of techniques used to secure communication and data from unauthorized access or modification. It involves the use of mathematical algorithms and principles to convert plain text into an unreadable format, known as ciphertext, and vice versa. The main objectives of cryptography are confidentiality, integrity, authentication, and non-repudiation. 5
  • 6. 01 Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) using an algorithm and a secret key. This ensures that even if the ciphertext is intercepted, it cannot be understood without the corresponding decryption key. 02 Decryption is the reverse process of encryption. It involves converting ciphertext back into plaintext using the correct decryption key. Only authorized parties with the correct key can decrypt the ciphertext and access the original data. Decryption 03 Symmetric cryptography, also known as secret-key cryptography, uses the same key for both encryption and decryption. The sender and receiver must share the secret key securely before communication can take place. Symmetric Cryptography 04 Asymmetric cryptography, also known as public-key cryptography, uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. The public key can be freely shared, while the private key must be kept secret. This allows for secure communication without the need to exchange secret keys beforehand. Asymmetric Cryptography 05 Hash functions are cryptographic algorithms that take an input (message) and produce a fixed-size output called a hash value or digest. Hash functions are used to verify the integrity of data, as even a small change in the input will result in a completely different hash value. Hash Functions 06 Cryptography relies on secure key management practices to ensure the confidentiality and integrity of data. This includes generating strong keys, securely distributing and storing them, and regularly updating them to maintain security. Key Management Encryption 6
  • 7. SYMMETRIC ENCRYPTION ALGORITHM In symmetric Encryption Algorithm a single encryption key is used in the encryption and decryption process The Encryption Key is conveyed to the sender and the recepient before the encryption /decription process So the Encryption key is vital and its strength is configent on its length 7
  • 8. 8
  • 9. EXAMPLES OF SYMMETRIC ENCRYPTION ALGORITHM RC2 RC5 Advance Encryption Standard Blowfish Data Encription Standard (DES) Hyrid (AES-RSA) Triple Data Encryption Standard (3DES) 9
  • 10. The Data Encryption Standard (DES) is a symmetric-key block cipher DES operates on fixed-size blocks of data, and each block is 64 bits long. The key length in DES is 56 bits DES was considered secure for many years, but due to advances in computing power, it is now vulnerable to brute-force attacks Data Encryption Standard (DES) 10
  • 11. 64-bit plaintext Initial permutation Round 1 Round 2 Round 16 Final permutation 64-bit ciphertext K₁ 48-bit K₂ 48-bit K16 48-bit Round-key generator DES -56-bit cipher key Structure of Data Encryption Standard 11
  • 12. Initial key is passed through a permutation function Round key is produces for 15 round of operation by Permutation is same for all rounds but different key the combination of left circular shift and permutation produced because of the repeated shifts of key bit 12
  • 13. Triple Data Encryption Standard (3DES) This is a process in through which data is encrypted using 56 bit two keys Its process follows EDE model , which says data must be sequentially encrypted twice and decrypted once. It encrypts using one encryption key, then decrypts using a different encryption key, and finally encrypts using same encryption key For encryption, EDE uses only 168-bit out of 192-bits keys 13
  • 14. Advances Encryption Standard (AES) AES was established as a federal standard by the National Institute of Standards and Technology (NIST) in 2001 AES is a symmetric-key algorithm AES supports key lengths of 128, 192, and 256 bits. The security strength of AES is directly related to the key length, and longer keys provide higher security. AES uses a substitution-permutation network (SPN) structure. The decryption process for AES is the inverse of the encryption process. AES is widely considered secure and has withstood extensive cryptanalysis. Its security is based on the choice of key length 14
  • 15. No of Rounds Key size (in bits) 10 128 12 192 14 256 Advanced Encryption Standard Structure 15
  • 16. AES-128 AES-192 AES-256 Key Size 128 192 256 Plaintext Size 128 128 128 Number of rounds 10 12 14 Round Key Size 128 128 128 Advanced Encryption Standard Parameters 16
  • 17. Blowfish Blowfish is a symmetric-key block cipher algorithm that was designed by Bruce Schneier in 1993 It is widely used for encryption and decryption of data. Blowfish operates on 64-bit blocks and supports key sizes ranging from 32 bits to 448 bits. It is known for its simplicity, speed, and security 17
  • 18. Assymetric algorithm In asymmetric encryption algorithms, two types of keys called Private keys and Public Keys, are utilized. The recipient’s public key is used to produce a ciphertext from the plaintext.. Then the ciphertext can only be decrypts using the recipient’s private key The private key is known by the authorized person only. But the public key is stored in the public domain for ease of assess Examples are Digital Signatures, Rivest-Shamir-Adleman (RSA) and so on 18
  • 20. Rivest-Shamir-Adleman (RSA) Algorithm Invented byRivest-Shamir-Adleman This is based on number theory, using two prime numbers or mathematical operation to randomly produce the public and private keys The public key (which is public) is used for encryption, and the private key (which is private) is used for decryption Sender encrypts the communication using public key of the recipient and when the communication is received, the recipient can decrypt it with its private key C= M^e mod n M= C^d mod n 20
  • 21. Hybrid Encryption Algorithm Hybrid encryption is a blend of symmetric and asymmetric encryption methods In a hybrid encryption scheme, data is encrypted using a symmetric key algorithm, and the symmetric key itself is protected by asymmetric encryption Hybrid encryption is commonly used in various secure communication protocols, including SSL/TLS for secure web browsing and PGP (Pretty Good Privacy) for secure email communication. 21
  • 22. Methodology The work proposes to ascertain which cryptographic algorithm is best suited for End-To- End Encryption security. By carrying out a performance evaluation analysis on various cryptographic algorithms; such as 3DES, DES, AES, Blowfish and Hybrid (AES-RSA). The following performance evaluation parameters such as encryption time, different key size, CPU utilization, memory consumption rate and overall process time, would be utilized 22
  • 23. Specify data to encrypt or decrypt DATA PHASE Generate results from each algorithm based on performance REPORT PHASE Select algorithm to process encryption or decryption ALGORITHM PHASE Microsoft Excel Simulation Parameters Data Phase Algorithm Phase Report Phase 23
  • 24. Performance Evaluation Parameters The performance evaluation parameters used to analysis comparatively the use case cryptographic algorithms below Encryption and Decryption Time Different Key Length (Size) CPU Utilization Time Period Memory Consumption Rate Overall Process Time 24
  • 25. File name File sizes Text 400, 1500, 2048, 3000 (bytes) Image 400, 1500, 2048, 3000 (kb) Audio 26.1(Mb) SIMULATION IMPLEMENTATION PyCharm IDE for windows applications was utilized to compile the simulation using the interpreter settings. And also, to implement the algorithms in python programing language The packages utilized are Ecryptography PyCryptodome Psutil The sizes of the input files used are shown in Table below and consists of text, images and audio 25
  • 26. RESULTS OF EXPERIMENT The results illustrate the effect of varying data sizes and the effect of encryption/decryption mode for each use case cryptographic algorithms While the audio file was used to ascertain the memory rate, CPU utilization, and overall process time. The overall result is transferred to Microsoft excel for more investigation and graphs plotted in Chart 1 – Chart 8 for each resourced measured 18
  • 27. 27
  • 28. 28
  • 29. Discussion of findings From the experimental results above, advanced encryption standard (AES) performed best in comparison to other algorithms But in terms of security, hybrid encryption is more secure combining the speed benefit of AES algorithm and security and key management benefit of RSA algorithm 29
  • 30. CONCLUSION AND RECOMMENDATION The research highlights the critical importance of selecting the right cryptographic algorithm for End-To-End Encryption security While AES is efficient, its limitations in key management led to the exploration of a Hybrid (AES-RSA) approach The hybrid solution, leveraging the strengths of both AES and RSA, emerged as a more secure and versatile option, especially in scenarios involving bidirectional communication The findings emphasize the need for a nuanced understanding of cryptographic algorithms and their implications for secure digital communication. 30
  • 31. REFERENCES Ohwo Onome Blaise, Oludele Awodele, Odunayo Yewande, "An Understanding and Perspectives of End-To-End Encryption", International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 4, April 2021 Ben Lutkevich, Madelyn Bacon, "What is End-to-End Encryption (E2EE) and How does it work?", Available at: https://www.techtarget.com What Is Data Encryption: Types, Algorithms, Techniques and Methods, Available at: https://www.simplilearn.com RSA Algorithm with example and mod calculation, Available at: https://youtu.be/y5dPfW3I9Aw?si=FYh7NJmoAtqihlLx 31