DEVELOPMENT OF A PROTOTYPE APPLICATION FOR EXCHANGING ENCRYPTED MESSAGES ON TELEGRAM WITH THE CHOICE OF THE OPTIMAL ENCRYPTION ALGORITHM
DOI:
https://doi.org/10.30890/2567-5273.2025-42-02-056Keywords:
Diffie-Hellman key agreement, encryption algorithms, encrypted file transfer, public-key cryptography, symmetric cryptographyAbstract
This paper presents a prototype application that provides application-layer encryption for messages delivered through Telegram. The workflow is intentionally simple: a sender encrypts a message locally, transmits it as an encrypted file payload via TelegrReferences
Ebrahim, M., Khan, S. and Khan, U. (2014) Symmetric Algorithm Survey: A Comparative Analysis, arXiv preprint, arXiv:1405.0398.
Muhammed, N. et al. (2017) Evaluation of Four Encryption Algorithms for Viability, Reliability, and Performance Estimation, Proceedings (online preprint).
Girish, N., Akshay, B. and Prathamesh, R. (2020) Comparative Analysis of Encryption Algorithms Against Text Files, Conference/Workshop paper or journal article (publication details not provided).
FIPS 197; Advanced Encryption Standard (AES); National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (26 November 2001).
FIPS 46-3; Data Encryption Standard (DES) (Withdrawn); National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (25 October 1999; withdrawn 19 May 2005).
NIST SP 800-67 Rev. 2; Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher; National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (November 2017).
Schneier, B. (1994) Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), in Fast Software Encryption (FSE ’93). Lecture Notes in Computer Science, Vol. 809. Springer.
Wheeler, D.J. and Needham, R.M. (1995) TEA: A Tiny Encryption Algorithm, in Fast Software Encryption (FSE ’94). Lecture Notes in Computer Science, Vol. 1008. Springer.
Rivest, R.L., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(2), pp. 120–126.
Jorge, R. (2020) cryptographic-benchmarking-aes-rsa-sha256. GitHub repository. (Accessed: 21 June 2024).
NIST SP 800-38D; Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC; National Institute of Standards and Technology; U.S. Department of Commerce: Gaithersburg, MD (28 November 2007).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.



