Abstract

The study, entitled Android SMS and File Manager Encrypted Application Using AES-Vigenere and AES/ECB/PKCS5/Padding a Hybrid Encryption Algorithm, was a proposed solution about Social Engineering and hacking. With the Data Privacy Act of 2012, the study encourages and inspires. The study's goal is to offer users security and safety for their personal information. The purpose of this research is to prevent cyber theft. The theft of financial and/or personal information through the use of a computer/device for fraudulent or other criminal purposes is referred to as cyber theft. For this situation, the study suggested solutions.The research covers the first chapter's Project Context, Purpose and Description, Conceptual Framework, Objectives, Scope, and Limitations. The first chapter offers a general overview of the application. The project background covered the area, challenge, and how the developers came up with the plan, as well as the main point of the research. The objectives were directed at the system's functioning, and the scope and constraints were addressed to determine the study's capability and boundaries. The research also offered the associated literature and study materials synthesized, such as the Changed AES Algorithm Using Multiple S-Boxes, which assists the group in altering and producing a unique and freshly modified algorithm that would improve the security of the application.The research, on the other hand, went into the technical background as well as the hardware and software requirements that the developers employed to improve the program. The research gives information on the system requirements that comprise the versions of software and hardware that the application's proponents utilized to develop it. The design and methodology of our study were also discussed. This includes many schematics depicting the system's flow as well as a constructed prototype. The research demonstrates the concepts and frameworks that the application's proponents utilized to design the application. This chapter contains factual information regarding the actions and techniques taken by the responders in constructing the application. This also includes ways for how the proponents undertake data collection operations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call