DJCCMT

Delta Journal of Computing, Communications and Media Technologies

ISSN:300456

Advancing research and innovation at the intersection of computing technology and media. A publication of Southern Delta University, Ozoro.

Delta Journal of Computing, Communications and Media Technologies(DJCCMT) is an open access double-blind peer reviewed and refereed Journal that brings together reasoned thoughts, research, and industry practice in areas of Computing, Artificial Intelligence, Robotics, System Engineering, Data Science, Analytics, Embedded Systems, Information and System Security, Media Studies, Communication Technologies, Information Science, Library Science, Educational Technologies, Applied Computing, and related disciplines in a reader-friendly format. The Journal is published online monthly with print version issue in February, May, August and November.

Delta Journal of Computing, Communications and Media Technologies

Volume 1 · Issue 1 · January 2025
Title of Paper

A SECURE WEB-BASED REAL-TIME MESSENGER USING AES-RSA ENCRYPTION

Abstract

૴ĸe exponential growth of web‑based communication platforms has heightened the urgency of protecting message confidentiality and integrity against increasingly sophisticated cyber‑attacks. While symmetric ciphers such as the Advanced Encryption Standard (AES) offer high performance, their secure key‑exchange remains a challenge in open networks. Conversely, asymmetric schemes like Rivest–Shamir–Adleman (RSA) ensure secure key distribution but suffer from computational overhead when encrypting large payloads. This paper presents the design and implementation of a secure, real‑time web messenger that leverages a hybrid AES–RSA encryption workflow to combine the low‑latency benefits of AES for message payloads with the robust key‑exchange properties of RSA. Our system is underpinned by an Event‑Driven Architecture (EDA) and a functional‑oriented analysis model, enabling modular, scalable, and responsive message handling over WebSocket connections. We describe the end‑to‑end encryption lifecycle—RSA‑protected AES key negotiation, AES‑encrypted message exchange, and seamless key rotation—within a modern browser–server stack. Performance benchmarks demonstrate end‑to‑end latency under 50 ms for typical text payloads, with negligible CPU impact on commodity hardware. Security analysis confirms resistance to man‑in‑the‑middle, replay, and brute‑force attacks. The proposed architecture thus delivers a practical blueprint for high‑throughput, real‑time messaging with enterprise‑grade confidentiality.

Authors

Paschal Uchenna Chinedu,Ogochukwu T. Emiri,Opuh Jude Iwedike,Emmanuel John Abah,Alero Efechukwu Moses,Emuejevoke Francis Ogbimi,Oghorodi Duke, Wilson Nwankwo

Keywords

Internet of Things, IoT, Adoption, Challenges for Usability, Opportunities

References
  1. ⼠义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㐲〰✲㼬㼬✬〲㐲㘭㈭✶丬䘧楡桴䄠敭❮丬愧敭档晩楡桴㐳䀵浧楡⹬潣ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬刧橥捥整❤✬✱✬✰丬䱕ⱌㄧⰧ啎䱌丬䱕ⱌ〧Ⱗⰿ啎䱌✬✰丬䱕ⱌⰿⰿ㈧Ⱗㄧ✱丬丧杩牥慩Ⱗⰿⰿⰿ啎䱌㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲〰✴㼬㼬✬〲㔲ㄭ㈭✶丬䐧⹲传慳睫ⱥ䜠摯楷❮丬漧慳睫来䁯獤獵⹴摥⹵杮ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌ〧Ⱗ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿ㔧Ⱗㄧ✲丬丧杩牥慩Ⱗⰿⰿⰿ❎㔱ⴶ㘱✷㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲〰✶㼬㼬✬〲㔲ㄭ㈭✶丬倧獡档污唠档湥慮䌠楨敮畤Ⱗ❎档湩摥灵䁵獤獵⹴摥⹵杮ⰧⰿⰿㄧⰧㄧⰧ❎睎湡睫❯丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✱丬䱕ⱌ啎䱌✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✴✬㘱Ⱗ❎楎敧楲❡㼬㼬㼬丬ㄧⴳ㘲⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㜰Ⱗⰿⰿ㈧㈰ⴵⴱ㜲Ⱗ❎牄‮湁穡慩䔠畬浥湵牯䬠穩瑩❯丬欧祡慭㜰祀桡潯挮浯ⰧⰿⰿㄧⰧㄧⰧ❎睎湡睫❯丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✱丬䱕ⱌ啎䱌✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✴✬㠱Ⱗ❎楎敧楲❡㼬㼬㼬丬㈧ⴷㄴ⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㠰Ⱗⰿⰿ㈧㈰ⴵⴱ㤲Ⱗ❎䭏佐啄倭䥈䥌ⱐ䌠剏䕄䥌⁁䵏乏䝉佈Ⱗ❎潣摲汥慩歯潰畤杀慭汩挮浯ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✰丬䱕ⱌㄧⰧ啎䱌丬䱕ⱌ〧Ⱗⰿ啎䱌✬✱丬䱕ⱌⰿⰿㄧⰧㄧ✵丬丧杩牥慩Ⱗⰿⰿⰿ啎䱌㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲〰✹㼬㼬✬〲㔲ㄭ㌭✱丬䨧协偅⁈䥓位⁎䙅久䥊倠⹨❄丬猧浩湯晥敥橮㍩䀸浧楡⹬潣❭㼬㼬✬✱✬✱丬渧❡丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧ〧Ⱗ啎䱌✬✱丬䱕ⱌ啎䱌✬✰㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✲✬ㄱⰧ❎楎敧楲❡㼬㼬㼬丬䱕⥌䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵〱Ⱗⰿⰿ㈧㈰ⴵⴲ✷丬伧佋䭎佗䔠呓䕈⁒乎䭅❁丬攧瑳敨祲〲㄰獵杀慭汩挮浯ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✰丬䱕ⱌㄧⰧ啎䱌丬䱕ⱌ〧Ⱗⰿ啎䱌✬✱丬䱕ⱌⰿⰿ㈧Ⱗㄧ✰丬丧杩牥慩Ⱗⰿⰿⰿ啎䱌㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲㄰✱㼬㼬✬〲㔲㈭ㄭ✷丬丧潪畫䌠牨獩楴湡䌠楨敭敲Ⱗ❎档楲湳潪畫㈸䀱浧楡⹬潣❭㼬㼬✬✱✬✱丬渧❡丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧ〧Ⱗ啎䱌✬✱丬䱕ⱌ啎䱌✬✰㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✲✬㔱Ⱗ❎楎敧楲❡㼬㼬㼬丬䱕⥌䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㈱Ⱗⰿⰿ㈧㈰ⴵⴳ✱丬唧畭潫潲䤠桧景睥獉慡⁣Ⱗ❎浵歵牯楯䁩獤獵⹴摥⹵杮ⰧⰿⰿㄧⰧㄧⰧ❎睎湡睫❯丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✰丬䱕ⱌ❎✱✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✱✬㠱Ⱗ❎楎敧楲❡㼬㼬㼬丬ㄧ㜱ㄭㄳ⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㌱Ⱗⰿⰿ㈧㈰ⴵⴴ㔲Ⱗ❎牆湡楣⁳睵摡慩Ⱗ❎睵摡慩䁦獤獵⹴摥⹵杮ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌ〧Ⱗ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿ㐧Ⱗㄧ✴丬丧杩牥慩Ⱗⰿⰿⰿ❎㐱ⴳ㔱✵㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲㄰✴㼬㼬✬〲㔲㐭㈭✶丬䄧敤潢慷敬䴠橯敥⁤祏睥污❥丬漧敹慷敬慭摀畳瑳攮畤渮❧㼬㼬✬✱✬✱丬倧潲⹦圠‮睎湡睫❯丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✰丬䱕ⱌ啎䱌✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✴✬㈱Ⱗ❎楎敧楲❡㼬㼬㼬丬ㄧ㈳ㄭ㈴⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㔱Ⱗⰿⰿ㈧㈰ⴵⴴ㘲Ⱗ❎杏捯畨睫⁵⹔䔠業楲Ⱗ❎慰瑳牯杯㉯㄰䀴浧楡⹬潣❭㼬㼬✬✱✬✱丬丧慷歮潷Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌㄧⰧ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿ㌧Ⱗㄧ✷丬丧杩牥慩Ⱗⰿⰿⰿ❎㘷㤭✰㬩义䕓呒䤠呎⁏摛潢⹝浛湡獵牣灩嵴⠠楛嵤嬬楴汴嵥嬬扡瑳慲瑣嵳嬬慤整景畳浢獩楳湯ⱝ捛牯敲灳湯楤杮畡桴牯ⱝ捛畡桴牯浥楡嵬嬬潤慭湩嵳嬬畡桴牯楬瑳ⱝ癛汯浵嵥嬬獩畳嵥嬬摥瑩牯ⱝ牛癥敩獷慴瑲慤整ⱝ晛汩湥浡嵥嬬瑳瑡獵ⱝ浛獥慳敧敳瑮潴畡桴牯ⱝ灛扵楬桳摥ⱝ灛扵楬桳摥慤整ⱝ捛牵敲瑮嵳嬬敲楶睥牥崱嬬敲楶睥牥崲嬬摥瑩牯敒楶睥灁牰癯摥ⱝ慛瑵潨湲浡獥ⱝ慛捣灥慴据䑥瑡嵥嬬捡散瑰摥ⱝ牛癥敩捷浯汰瑥潩䑮瑡嵥嬬敫睹牯獤ⱝ牛晥牥湥散ⱝ湛浵畁桴牯嵳嬬畮偭条獥ⱝ捛畯瑮祲ⱝ牛晥牥湥散嵳嬬捡湫睯敬杤浥湥嵴嬬異汢獩敨晤汩湥浡嵥嬬慰敧嵳
䅖啌卅⠠❎䩄䍃呍ㄱ〲㔲㄰✶㼬㼬✬〲㔲㐭㈭✷丬䨧湡瑥传潮敭⁨払杯❵丬甧潢畧慪敮䁴浧楡⹬潣❭㼬㼬✬✱✬✱丬倧潲⹦匠湩桧Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌ〧Ⱗ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿ㈧Ⱗㄧ✲丬丧杩牥慩Ⱗⰿⰿⰿ❎ⴱ㈱⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㜱Ⱗⰿⰿ㈧㈰ⴵⴴ㜲Ⱗ❎流湡慤传敫敫Ⱗ❎歯步慥慭摮㙡䀲浧楡⹬潣❭㼬㼬✬✱✬✱丬倧潲⹦匠湩桧Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌ〧Ⱗ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿㄧ✱✬㌱Ⱗ❎楎敧楲❡㼬㼬㼬丬㐧ⴲ㜵⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㠱Ⱗⰿⰿ㈧㈰ⴵⴴ㜲Ⱗ❎摁楡桧敄湮獩Ⱗ❎摡楡桧摯䁯獤獵⹴摥⹵杮ⰧⰿⰿㄧⰧㄧⰧ❎杉楢潮楶❡丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✰丬䱕ⱌ啎䱌✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✴✬㤱Ⱗ❎楎敧楲❡㼬㼬㼬丬㔧ⴸ㔷⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵㤱Ⱗⰿⰿ㈧㈰ⴵⴴ㤲Ⱗ❎潒敳传潪睨桯Ⱗ❎橯桯潷牨獯ㅥ杀慭汩挮浯ⰧⰿⰿㄧⰧㄧⰧ❎慮Ⱗ啎䱌㼬丬䄧捣灥整❤✬✱✬✱丬䱕ⱌ〧Ⱗ啎䱌丬䱕ⱌㄧⰧⰿ啎䱌✬✱丬䱕ⱌⰿⰿㄧⰧㄧ✲丬丧杩牥慩Ⱗⰿⰿⰿ❎ㄹㄭ㈰⤧䤻华剅⁔义佔嬠扤嵯嬮慭畮捳楲瑰⁝嬨摩ⱝ瑛瑩敬ⱝ慛獢牴捡獴ⱝ摛瑡潥獦扵業獳潩嵮嬬潣牲獥潰摮湩慧瑵潨嵲嬬慣瑵潨敲慭汩ⱝ摛浯楡獮ⱝ慛瑵潨汲獩嵴嬬潶畬敭ⱝ楛獳敵ⱝ敛楤潴嵲嬬敲楶睥瑳牡摴瑡嵥嬬楦敬慮敭ⱝ獛慴畴嵳嬬敭獳条獥湥瑴慯瑵潨嵲嬬異汢獩敨嵤嬬異汢獩敨摤瑡嵥嬬畣牲湥獴ⱝ牛癥敩敷ㅲⱝ牛癥敩敷㉲ⱝ敛楤潴割癥敩䅷灰潲敶嵤嬬畡桴牯慮敭嵳嬬捡散瑰湡散慄整ⱝ慛捣灥整嵤嬬敲楶睥潣灭敬楴湯慄整ⱝ歛祥潷摲嵳嬬敲敦敲据嵥嬬畮䅭瑵潨獲ⱝ湛浵慐敧嵳嬬潣湵牴嵹嬬敲敦敲据獥ⱝ慛正潮汷摥敧敭瑮ⱝ灛扵楬桳摥楦敬慮敭ⱝ灛条獥⥝嘠䱁䕕⁓丨䐧䍊䵃ㅔ㈱㈰〵〲Ⱗⰿⰿ㈧㈰ⴵⴴ㤲Ⱗ❎歏敩畭整倠瑡敩据⁥歁数睶杯❨丬漧楫整潷汲䁤浧楡⹬潣❭㼬㼬✬✱✬✱丬渧❡丬䱕ⱌⰿ❎捁散瑰摥ⰧㄧⰧㄧⰧ啎䱌✬✰丬䱕ⱌ啎䱌✬✱㼬丬䱕ⱌㄧⰧ啎䱌㼬㼬✬✲✬㘱Ⱗ❎楎敧楲❡㼬㼬㼬丬ㄧ㌰ㄭ㘱⤧W. & Ukhurebor,K.E. (2019). Investigating the Performance of Point to Multipoint Microwave Connectivity across Undulating Lands끓࿴ĸ࿴ĸuring Rainfall. (2019). Journal of the Nigerian Society of Physical Sciences, 1(3), 103-115. https://doi.org/10.46481/jnsps.2019.16
  2. Nwankwo,W., Olayinka, A.S., and Ukhurebor, K.E. (2019). The Urban Traffic Congestion Problem in Benin City and the Search for an ICT-improved Solution. International Journal of Science and Technology, 8(12), 65-72.
  3. Nwankwo, W. and Ukaoha, K.C. (2019). Socio-Technical perspectives on Cybersecurity: Nigeria’s Cybercrime Legislation in Review; International Journal of Scientific and Technology Research, 8(9), 47-58.
  4. Nwankwo, W. (2020). A Review of Critical Security Challenges in SQL-based and NoSQL Systems from 2010 to 2019. International Journal of Advanced Trends in Computer Science and Engineering, 9(2),2029-2035
  5. Nwankwo, W., Chinedu, P.U., Masajuwa, F.U., Njoku,C.C., & Imoisi,S.E.(2023). Adoption of i-Voting Infrastructure: Addressing Network-level Cybersecurity Breaches. E-Government- An Int’l Journal, 19(3), 273-303. https://doi.org/10.1504/EG.2023.130582
  6. Nwankwo, W. & Chinedu, P.U. (2018). Security of Cloud Virtualized Resource on a SaaS Encryption Solution, Science Journal of Energy engineering, 6(1), 8-17. doi: 10.11648/j.sjee.20180601.12.
  7. Nwankwo, W., Chinedu,P.U., Daniel,A., Shaba,S.M., Momoh,O.M., Nwankwo,C.P., Adigwe, W., Oghorodo,D., & Uwadia,F.(2023). Educational FinTech: Promoting Stakeholder Confidence Through Automatic Incidence Resolution. In: Hu, Z., Wang, Y., He, M. (eds) Advances in Intelligent Systems, Computer Science and Digital Economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham. https://doi.org/10.1007/978-3-031-24475-9_78
  8. Nwankwo, W., Kizito, A. E., Adigwe, W., Nwankwo, C. P., Uwadia, F., & Mande, S. (2022a). A community cloud-based store for forensic operations in cybercrime control. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051615.
  9. Nwankwo, C., Adigwe, W., Nwankwo, W., Kizito, A. E., Konyeha, S., & Uwadia, F. (2022b). An improved password-authentication model for access control in connected systems. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051179.
  10. Nwankwo, C., Uwadia, F., Nwankwo, W., Adigwe, W., Chinedu, P., & Ojei, E. (2022c). Privacy and security of content: A study of user-resilience and pre-checks on social media. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051589.
  11. Nwankwo,C.P., Konyeha,S., Edegbe,G.N., Omaji,S., Nwankwo,W.(2024). Improving Open-Source Network Security Tooling for the Corporate Enterprise. 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON), Ado Ekiti, Nigeria, 2024, pp. 1-5, doi: 10.1109/NIGERCON62786.2024.10927387.
  12. Ovili, H.P., Okpor, M., Olayinka,T., Ojei, E., Nwanze.N.E., Nwankwo,W.(2024). Improved Traffic Filtering for IoT Security. 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON), Ado Ekiti, Nigeria, 2024, pp. 1-5, doi: 10.1109/NIGERCON62786.2024.10926937
  13. Rachmawati, D., Tarigan, J. T., & Ginting, A. B. C. (2018). A comparative study of Message Digest 5 (MD5) and SHA 256 algorithm. Journal of Physics: Conference Series, 978, 012116. https://doi.org/10.1088/1742-6596/978/1/012116
  14. Rivest, R. L. (1990). Cryptography. In Algorithms and Complexity (pp. 717–755). Elsevier. https://doi.org/10.1016/B978-0-444-88071-0.50018-7
  15. Stallings, W. (2006). Cryptography and network security: Principles and practice (4th ed.). Pearson/Prentice Hall.