DJCCMT

Delta Journal of Computing, Communications and Media Technologies

ISSN:3092-8478

Advancing research and innovation at the intersection of computing technology and media. A publication of Southern Delta University, Ozoro.

Delta Journal of Computing, Communications and Media Technologies(DJCCMT) is an open access double-blind peer reviewed and refereed Journal that brings together reasoned thoughts, research, and industry practice in areas of Computing, Artificial Intelligence, Robotics, System Engineering, Data Science, Analytics, Embedded Systems, Information and System Security, Media Studies, Communication Technologies, Information Science, Library Science, Educational Technologies, Applied Computing, and related disciplines in a reader-friendly format. The Journal is published online monthly with print version issue in February, May, August and November.

Delta Journal of Computing, Communications and Media Technologies

Volume 1 · Issue 1 · December 2024
Title of Paper

A SECURE WEB-BASED REAL-TIME MESSENGER USING AES-RSA ENCRYPTION

Abstract

The exponential growth of web‑based communication platforms has heightened the urgency of protecting message confidentiality and integrity against increasingly sophisticated cyber‑attacks. While symmetric ciphers such as the Advanced Encryption Standard (AES) offer high performance, their secure key‑exchange remains a challenge in open networks. Conversely, asymmetric schemes like Rivest–Shamir–Adleman (RSA) ensure secure key distribution but suffer from computational overhead when encrypting large payloads. This paper presents the design and implementation of a secure, real‑time web messenger that leverages a hybrid AES–RSA encryption workflow to combine the low‑latency benefits of AES for message payloads with the robust key‑exchange properties of RSA. Our system is underpinned by an Event‑Driven Architecture (EDA) and a functional‑oriented analysis model, enabling modular, scalable, and responsive message handling over WebSocket connections. We describe the end‑to‑end encryption lifecycle—RSA‑protected AES key negotiation, AES‑encrypted message exchange, and seamless key rotation—within a modern browser–server stack. Performance benchmarks demonstrate end‑to‑end latency under 50 ms for typical text payloads, with negligible CPU impact on commodity hardware. Security analysis confirms resistance to man‑in‑the‑middle, replay, and brute‑force attacks. The proposed architecture thus delivers a practical blueprint for high‑throughput, real‑time messaging with enterprise‑grade confidentiality.

Authors

Paschal Uchenna Chinedu,Ogochukwu T. Emiri,Opuh Jude Iwedike,Emmanuel John Abah,Alero Efechukwu Moses,Emuejevoke Francis Ogbimi,Oghorodi Duke, Wilson Nwankwo

Keywords

Internet of Things, IoT, Adoption, Challenges for Usability, Opportunities

References
  1. Abdelnapi, N. M., Omara, F. A., & Omran, N. F. (2016). A hybrid hashing security algorithm for data storage on cloud computing. https://doi.org/10.13140/RG.2.1.4103.3844
  2. Acheme, S.O., Nwankwo, W., Acheme, D., Nwankwo, C.P. (2023). A Crypto-Stego Distributed Data Hiding Model for Data Protection in a Single Cloud Environment. In: Hu, Z., Wang, Y., He, M. (eds) Advances in Intelligent Systems, Computer Science and Digital Economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham. https://doi.org/10.1007/978-3-031-24475-9_38
  3. Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal of Computer Science and Communication, 4(5), 6.
  4. Ahmed, S., Patel, R., & Lee, M. (2025, January). Strengthening file encryption with AES–RSA hybrid algorithm: A critical review of strengths, weaknesses and future directions [Manuscript in preparation].
  5. Albahar, M. A., Olawumi, O., Haataja, K., & Toivanen, P. (2018). Novel hybrid encryption algorithm based on AES, RSA, and Twofish for Bluetooth encryption. Journal of Information Security, 9(2), 168–176. https://doi.org/10.4236/jis.2018.92012
  6. Chandu, Y., Kumar, K. S. R., Prabhukhanolkar, N. V., Anish, A. N., & Rawal, S. (2017). Design and implementation of hybrid encryption for the security of IoT data. In 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon) (pp. 1228–1231). IEEE. https://doi.org/10.1109/SmartTechCon.2017.8358562
  7. Chengliang Liang, C., Ye, N., Malekian, R., & Wang, R. (2016). The hybrid encryption algorithm of lightweight data in cloud storage. In 2016 2nd International Symposium on Agent, Multi Agent Systems and Robotics (ISAMSR) (pp. 160–166). IEEE. https://doi.org/10.1109/ISAMSR.2016.7810021
  8. Chinedu, P. U. (2018). Secured cloud based framework for ICT intensive virtual organisation (Unpublished doctoral dissertation). Federal University of Technology Owerri; LAP LAMBERT Academic Publishing.
  9. Chinedu, P. U., Aliu, D., Momoh, M. O., Nwankwo, W., & Shaba, S. M. (2020). Cloud security concerns: Assessing the fears of service adoption. Archive of Science & Technology, 1(2), 164–174.
  10. Chinedu, P. U., Nworuh, G. E., Osuagwu, O. E., & Eze, U. F. (2015). The security of user data: Demystifying fear to cloud model and service adoption and deployment. International Journal of Academic Research, 7(1).
  11. Chinedu, P. U., Ugwuegbulam, C., & Akagha, C. (2015). Towards a cryptographically secure cloud security solution. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 5(1).
  12. Chinedu, P.U, Nwankwo,W., Olanrewaju,B.S., Olayinka T.C. (2018). Cloud-Based Virtual Organization Framework for Optimizing Corporate Value Chain. International Journal of Discrete Mathematics, 3(1), 11-20
  13. Chinedu, P. U., Nwankwo, W., Eze, U. F.(2013). Enterprise Cloud Adoption: Leveraging on the Business and Security Benefits, West African Journal of Industrial and Academic Research, 7(1).
  14. Daniel, A., Shaba, S. M., Momoh, M. O., Chinedu, P. U., & Nwankwo, W. (2021). A computer security system for cloud computing based on encryption technique. Computer Engineering and Applications, 10(1).
  15. El, A. E. T. (2013). Design and implementation of hybrid encryption algorithm. International Journal of Computer Applications, 4(12), 6.
  16. Irughe, D. U., Nwankwo, W., Nwankwo, C. P., & Uwadia, F. (2022). Resilience and security on enterprise networks: A multi-sector study. 2022 5th Information Technology for Education and Development (ITED), 1–7. https://doi.org/10.1109/ITED56637.2022.10051458.
  17. Jintcharadze, E., & Iavich, M. (2020). Hybrid implementation of Twofish, AES, ElGamal, and RSA cryptosystems. In 2020 IEEE East West Design & Test Symposium (EWDTS) (pp. 1–5). IEEE. https://doi.org/10.1109/EWDTS50664.2020.9224901
  18. Kadam, K. G., & Khairnar, V. (2015). Hybrid RSA AES encryption for web services. International Journal of Computer Applications, 31(6), 6–10.
  19. Kifordu,A., Nwankwo,W., and Ukpere, W. (2019). The Role of Public Private Partnership on the Implementation of National Cybersecurity Policies: A Case of Nigeria. Journal of Advanced Research in Dynamical and Control Systems, 11(8), 1386-1392. Special issue.
  20. Kvyetnyy, R. N., Romanyuk, O. N., Titarchuk, E. O., Gromaszek, K., & Mussabekov, N. (2016). Usage of the hybrid encryption in a cloud instant messages exchange system. In R. S. Romaniuk (Ed.), Proceedings of SPIE (Vol. 10031, p. 100314S). SPIE. https://doi.org/10.1117/12.2249190
  21. Mahalle, V. S., & Shahade, A. K. (2014). Enhancing the data security in the cloud by implementing a hybrid (RSA & AES) encryption algorithm. In 2014 International Conference on Power, Automation and Communication (INPAC) (pp. 146–149). IEEE. https://doi.org/10.1109/INPAC.2014.6981152
  22. Maharana, V., Rao, K., Biswas, S. D., Chandrakar, H., & Panika, L. (2024, April). Comparative analysis of hybrid models of AES RSA and AES Triple DES algorithms for encryption of images and videos. Journal of Emerging Technologies and Innovative Research.
  23. Miculan, M., & Vitacolonna, N. (2023). Automated verification of Telegram’s MTProto 2.0 in the symbolic model. Computers & Security. doi:10.1016/j.cose.2023.102487
  24. Momoh, M. O., Chinedu, P., Nwankwo, W., Aliu, D., & Shaba, M. (2021). Blockchain Adoption: Applications and Challenges. International Journal of Software Engineering and Computer Systems, 7(2), 19–25. https://doi.org/10.15282/ijsecs.7.2.2021.3.0086
  25. Nwankwo, W. and Olayinka, A.S. (2019). Implementing a risk management and X-Ray cargo scanning document management prototype, International Journal of Scientific and Technology Research, 8(9),93-105.
  26. Nwankwo, W. & Kifordu, A. (2019). Strengthening Private Sector Participation in Public Infrastructure Projects through Concession Policies and Legislations in Nigeria: A Review. Journal of Advanced Research in Dynamical and Control Systems,11(08).
  27. Nwankwo,W. & Ukhurebor,K.E. (2019). Investigating the Performance of Point to Multipoint Microwave Connectivity across Undulating Landscape during Rainfall. (2019). Journal of the Nigerian Society of Physical Sciences, 1(3), 103-115. https://doi.org/10.46481/jnsps.2019.16
  28. Nwankwo,W., Olayinka, A.S., and Ukhurebor, K.E. (2019). The Urban Traffic Congestion Problem in Benin City and the Search for an ICT-improved Solution. International Journal of Science and Technology, 8(12), 65-72.
  29. Nwankwo, W. and Ukaoha, K.C. (2019). Socio-Technical perspectives on Cybersecurity: Nigeria’s Cybercrime Legislation in Review; International Journal of Scientific and Technology Research, 8(9), 47-58.
  30. Nwankwo, W. (2020). A Review of Critical Security Challenges in SQL-based and NoSQL Systems from 2010 to 2019. International Journal of Advanced Trends in Computer Science and Engineering, 9(2),2029-2035
  31. Nwankwo, W., Chinedu, P.U., Masajuwa, F.U., Njoku,C.C., & Imoisi,S.E.(2023). Adoption of i-Voting Infrastructure: Addressing Network-level Cybersecurity Breaches. E-Government- An Int’l Journal, 19(3), 273-303. https://doi.org/10.1504/EG.2023.130582
  32. Nwankwo, W. & Chinedu, P.U. (2018). Security of Cloud Virtualized Resource on a SaaS Encryption Solution, Science Journal of Energy engineering, 6(1), 8-17. doi: 10.11648/j.sjee.20180601.12.
  33. Nwankwo, W., Chinedu,P.U., Daniel,A., Shaba,S.M., Momoh,O.M., Nwankwo,C.P., Adigwe, W., Oghorodo,D., & Uwadia,F.(2023). Educational FinTech: Promoting Stakeholder Confidence Through Automatic Incidence Resolution. In: Hu, Z., Wang, Y., He, M. (eds) Advances in Intelligent Systems, Computer Science and Digital Economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham. https://doi.org/10.1007/978-3-031-24475-9_78
  34. Nwankwo, W., Kizito, A. E., Adigwe, W., Nwankwo, C. P., Uwadia, F., & Mande, S. (2022a). A community cloud-based store for forensic operations in cybercrime control. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051615.
  35. Nwankwo, C., Adigwe, W., Nwankwo, W., Kizito, A. E., Konyeha, S., & Uwadia, F. (2022b). An improved password-authentication model for access control in connected systems. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051179.
  36. Nwankwo, C., Uwadia, F., Nwankwo, W., Adigwe, W., Chinedu, P., & Ojei, E. (2022c). Privacy and security of content: A study of user-resilience and pre-checks on social media. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051589.
  37. Nwankwo,C.P., Konyeha,S., Edegbe,G.N., Omaji,S., Nwankwo,W.(2024). Improving Open-Source Network Security Tooling for the Corporate Enterprise. 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON), Ado Ekiti, Nigeria, 2024, pp. 1-5, doi: 10.1109/NIGERCON62786.2024.10927387.
  38. Ovili, H.P., Okpor, M., Olayinka,T., Ojei, E., Nwanze.N.E., Nwankwo,W.(2024). Improved Traffic Filtering for IoT Security. 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON), Ado Ekiti, Nigeria, 2024, pp. 1-5, doi: 10.1109/NIGERCON62786.2024.10926937
  39. Rachmawati, D., Tarigan, J. T., & Ginting, A. B. C. (2018). A comparative study of Message Digest 5 (MD5) and SHA 256 algorithm. Journal of Physics: Conference Series, 978, 012116. https://doi.org/10.1088/1742-6596/978/1/012116
  40. Rivest, R. L. (1990). Cryptography. In Algorithms and Complexity (pp. 717–755). Elsevier. https://doi.org/10.1016/B978-0-444-88071-0.50018-7
  41. Stallings, W. (2006). Cryptography and network security: Principles and practice (4th ed.). Pearson/Prentice Hall.