DEVELOPMENT OF A PROTOTYPE APPLICATION FOR EXCHANGING ENCRYPTED MESSAGES ON TELEGRAM WITH THE CHOICE OF THE OPTIMAL ENCRYPTION ALGORITHM

Authors

DOI:

https://doi.org/10.30890/2567-5273.2025-42-02-056

Keywords:

Diffie-Hellman key agreement, encryption algorithms, encrypted file transfer, public-key cryptography, symmetric cryptography

Abstract

This paper presents a prototype application that provides application-layer encryption for messages delivered through Telegram. The workflow is intentionally simple: a sender encrypts a message locally, transmits it as an encrypted file payload via Telegr

References

Ebrahim, M., Khan, S. and Khan, U. (2014) Symmetric Algorithm Survey: A Comparative Analysis, arXiv preprint, arXiv:1405.0398.

Muhammed, N. et al. (2017) Evaluation of Four Encryption Algorithms for Viability, Reliability, and Performance Estimation, Proceedings (online preprint).

Girish, N., Akshay, B. and Prathamesh, R. (2020) Comparative Analysis of Encryption Algorithms Against Text Files, Conference/Workshop paper or journal article (publication details not provided).

FIPS 197; Advanced Encryption Standard (AES); National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (26 November 2001).

FIPS 46-3; Data Encryption Standard (DES) (Withdrawn); National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (25 October 1999; withdrawn 19 May 2005).

NIST SP 800-67 Rev. 2; Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher; National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (November 2017).

Schneier, B. (1994) Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), in Fast Software Encryption (FSE ’93). Lecture Notes in Computer Science, Vol. 809. Springer.

Wheeler, D.J. and Needham, R.M. (1995) TEA: A Tiny Encryption Algorithm, in Fast Software Encryption (FSE ’94). Lecture Notes in Computer Science, Vol. 1008. Springer.

Rivest, R.L., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(2), pp. 120–126.

Jorge, R. (2020) cryptographic-benchmarking-aes-rsa-sha256. GitHub repository. (Accessed: 21 June 2024).

NIST SP 800-38D; Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC; National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (28 November 2007).

Published

2025-12-30

How to Cite

Басараб, О., & Басараб, О. (2025). DEVELOPMENT OF A PROTOTYPE APPLICATION FOR EXCHANGING ENCRYPTED MESSAGES ON TELEGRAM WITH THE CHOICE OF THE OPTIMAL ENCRYPTION ALGORITHM. Modern Engineering and Innovative Technologies, 2(42-02), 69–75. https://doi.org/10.30890/2567-5273.2025-42-02-056

Issue

Section

Articles