FOUR DYNAMIC ENCRYPTION ALTERNATIVES WITH ARTIFICIAL INTELLIGENCE BASED ON PSEUDO-HEXADECIMAL NOISY INJECTION SCHEMA FOR HANDLING THE THEFT OF DIGITAL DATA PROBLEM

Автор: Rangel-Lugo, Edgar, Rangel-Ríos, Kevin Uriel, González-Vidales, Leonel, Ortiz-Mariano, Amparo and Rodríguez-Torres, César Del Ángel
Организация: Instituto Tecnológico de Ciudad Altamirano

Категория:

Ключевые слова: Dynamic encryption methods, applications of AI, cryptography, noisy injection, pseudo-hexadecimal encoding
Аннотация. The theft of digital data problem is receiving growing attention. This situation can produce losses in the organisation's finances, when the used cybersecurity strategy, it is not adequate such as the employment of static encryption methods. There exist several safe alternatives based on standard encryption algorithms such as AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), to mention a few. However, it is known that these algorithms, they have been threatened by quantum computing advent. In some cases, it has been handled with dynamic encryption methodology, which it can create different ciphertext results with the same plaintext input. This schema can help to mistake the cybercriminals. In this paper, several aspects related to this subject, they are here studied although quantum computing is not used in this work, other measures have been proposed. We recommend the replacement of static encryption method by another dynamic alternative. Recent proposals recommend using pseudo-hexadecimal encoding with artificial intelligence. This research is future work of these strategies because it has been observed that these proposals, they can take a long time for processing. This situation might be very good for data protection of the organisations. That's why the importance of our work because that pseudo-hexadecimal encoding with artificial intelligence schema, it has been presented as a good alternative. Regarding the research's aims, they consist in the noisy injection and to avoid that ciphertext can be decrypted by cybercriminals. Four novel proposals based on pseudo-hexadecimal noisy injection strategy that they were named here as noisy random pseudo-hexadecimal standard version, noisy random pseudo-hexadecimal by substitution, noisy random pseudo-hexadecimal by shifting, and noisy random pseudo-hexadecimal version 2, they are here recommended as dynamic encryption alternatives. Finally, the comparison of results with some standard encryption algorithms, it is also introduced.

Библиография:

Rangel, E., Rangel, KU., and González, L. 2024. "Cifrado De Datos Dinámico Con Inteligencia Artificial, Utilizando El Nuevo Formato Pseudo-Hexadecimal". Revista Electrónica de Divulgación de la Investigación del SABES (Revista de la universidad del SABES), vol. 28, edición diciembre 2024. ISSN: 2007-3542. Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México. Available at: https://sabes.edu.mx/revista-electronica/27/# , (17/12/2024).
Rangel, E., and Rangel, KU. 2024a. "Novel Random Encryption Methods Based On Mutation Strategies Of Artificial Intelligence". Scientific and Practical Cyber Security Journal (SPCSJ), Vol. 8, No. 3. September Issue 2024. ISSN: 2587-4667 (electronic). Edited by SCSA - SPCSJ - BOAI. Published by Scientific Cyber Security Association in Georgia. Tbilisi, Georgia. Available at: https://journal.scsa.ge/issue/september-2024/, (05/11/2024).
Drzani, M. 2014. "Securing E-learning platforms". 2014 International Conference on Web and Open Access to Learning (ICWOAL), Dubai, United Arab Emirates, 1-4. Available at: https://doi.org/10.1109/ICWOAL.2014.7009237, (23/03/2025).
Mamman, J., Onoja, O., and Blessing, E. 2024. "Mitigating The Impact Of Phishing Attacks On The E-learning Infrastructure". Scientific and Practical Cyber Security Journal (SPCSJ), 8(3): 21-34. ISSN: 2587-4667. Scientific Cyber Security Association (SCSA). Tbilisi, Georgia. Available at: https://journal.scsa.ge/issues-archive/, (23/03/2025).
Rangel, E., Rangel, KU., Medrano, J., Bernal, CA., and González, L. 2023. "Algoritmo Genético Para Cifrado De Datos, Basado En Un Nuevo Concepto Pseudo-Hexadecimal Con Inteligencia Artificial". Tecnológico Nacional De México, Instituto Tecnológico de Cd. Altamirano. Sexto (VI) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas. Noviembre, 2023. Cd. Altamirano, Estado De Guerrero, México. Available at: https://www.cdaltamirano.tecnm.mx/index.php/17-vi-congreso-nacional-de-investigacion-en-ciencia-e-innovacion-de-tecnologias-productivas/140-tecnm-40 , (23/03/2024).
Rangel, E., Rangel, KU., and González, L. 2025. "Dynamic Encryption Methods Based On Noisy Injection And Camouflaging Ciphertext Strategies With Artificial Intelligence", SPCSJ: Scientific and Practical Cyber Security Journal (Published by Scientific Cyber Security Association in Tbilisi, Georgia), ISSN: 2587–4667, vol. 9, no. 1, pp. 82-104, march issue. Available at: https://journal.scsa.ge/papers/dynamic-encryption-methods-based-on-noisy-injection-and-camouflaging-ciphertext-strategies-with-artificial-intelligence/, (23/04/2025).
Alvarez, D. 2019. "Algunos Aspectos Jurídicos Del Cifrado De Comunicaciones". Derecho PUCP, núm. 83, 2019, pp. 241-264. Pontificia Universidad Católica del Perú (2019). DOI: https://doi.org/10.18800/derechopucp.201902.008. Available at: http://www.redalyc.org/articulo.oa?id=533662765008, (23/03/2024).
Barandela, R., Sánchez, JS., García, V., and Rangel, E. 2003. "Strategies for Learning in Class Imbalance Problems". Pattern Recognition, Vol. 36, No. 3, pp. 849-851. Rapid and Brief Comunication (Pergamon) ISBN: (PII: S0031-3203(02)00257-1. 0031-3203/02/). Available at: https://doi.org/10.1016/S0031-3203(02)00257-1 , (23/03/2024).
Barranco, F., and Galindo, C. 2022. "Criptografía básica y algunas aplicaciones". Universidad Jaume I, Departamento de Matemáticas, Castellón, España. Available at: https://repositori.uji.es/xmlui/bitstream/handle/10234/201359/TFM_2022_Barranco_Bl%C3%A1zquez_FranciscoMiguel.pdf?sequence=1 , (23/03/2024).
Cover, TM., and Hart, PE. 1967. "Nearest Neighbor Pattern Classification". IEEE Transactions on Information Theory, Volume IT-13, January 1967, pages 21-27. Available at: https://ieeexplore.ieee.org/abstract/document/1053964/ , (23/03/2024).
Gómez, S. , Arias, JD., and Agudelo, D. 2012. "Cripto-Análisis Sobre Métodos Clásicos De Cifrado". Scientia Et Technica, vol. XVII, núm. 50, abril, pp. 97-102. Universidad Tecnológica de Pereira Pereira, Colombia. ISSN 0122-1701 97. Available at: http://www.redalyc.org/articulo.oa?id=84923878015, (23/03/2024).
Javidi, B., Zhang, GS., and Li, J. 1997. "Encrypted Optical Memory Using Double-random Phase Encoding". Appl. Opt. 36, 1054-1058. Available at: https://pubmed.ncbi.nlm.nih.gov/18250772/ , (23/03/2024).
Rangel, E. 2022. "La Regla De Los k Vecinos Más Cercanos (k-NN) Basada En Distancia De Manhattan (City-Block) Para Mejorar La Clasificación De Patrones". Publicado En: Quinto Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas. Tecnológico Nacional De México (campus: Instituto Tecnológico de Cd. Altamirano). Noviembre, 2022. Cd. Altamirano, Estado De Guerrero, México. Available at: http://erangel.coolpage.biz/pappers/edgarrangel2022.pdf , (23/03/2024).
Reddaiah, BA. 2019. "Study on Genetic Algorithms for Cryptography". International Journal of Computer Applications (0975 – 8887). Volume 177 - No. 28, December 2019. Department of Computer Applications. Yogi Vemana University Kadapa, A.P, India. Available at: https://www.researchgate.net/publication/338012809_A_Study_on_Genetic_Algorithms_for_Cryptography , (23/03/2024).
Sebas, C. 2023. "¿Qué son los Algoritmos Genéticos en las Inteligencias Artificiales?". Manuales y Tutoriales de Informatica. Available at: https://aprendeinformaticas.com/ia/ ,(23/03/2024).
Ennu, G., Martes, M., and Boratto, L. 2018. "A multi-brometne system for continuous student authentication in e-learning platforms". Pattern Recognition Letters, 113, 83-92. Available at: https://doi.org/10.1016/j.patrec.2017.03.027, (23/03/2025).
Paul, S., Dasgupta, P., Naskar, PK., and Chaudhuri, A. 2017. "Secured image encryption scheme based on DNA encoding and chaotic map", Review Of Computer Engineering Studies, IIETA: International Information and Engineering Technology Association. ISSN: 2369-0755, e-ISSN: 2369-0763, vol. 4, no. 2, pp. 70-75, issue june, doi: 10.18280/rces.040206. Available at: https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://iieta.org/sites/default/files/Journals/RCES/04.02_06.pdf&ved=2ahUKEwjVlYfordOMAxVVLUQIHXknBWsQFnoECB4QAQ&usg=AOvVaw3yvem4PsuKbMM9009owuAJ, (12/04/2015).
Delman, B. 2004. "Genetic Algorithms in Cryptography". Thesis for the Degree of Master of Science in Computer Engineering. Rochester Institute of Technology, RIT Scholar Works. Department of Computer Engineering. Available at: https://scholar.google.com.mx/scholar_url?url=https://repository.rit.edu/cgi/viewcontent.cgi%3Farticle%3D6460%26context%3Dtheses&hl=es&sa=X&ei=cbaZZoadNt246rQPnd604AU&scisig=AFWwaeaMfCM5ORUFQN6DU4LA3aEG&oi=scholarr,
Granados, G. 2006. "Introducción A La Criptografía", UNAM (Universidad Nacional Autónoma de México), Revista Digital Universitaria (ISSN: 1607 - 6079), vol. 7, no. 7, julio. Available at: http://www.revista.unam.mx/vol.7/num7/art55/int55.htm
Kalsi, S., Kaur, H., and Chang, V. 2018. "DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation". Convergence of Deep Machine Learning and Nature Inspired Computing Paradigms for Medical Informatics. Image & Signal Processing. In Journal of Medical Systems, volume 42. Article number: 17. DOI: https://doi.org/10.1007/s10916-017-0851
Mendoza, JC. 2008. "Demostración De Cifrado Simetrico Y Asimetrico". Ingenius. Revista de Ciencia y Tecnología, núm. 3, pp. 46-53. Universidad Politécnica Salesian. Cuenca, Ecuador. ISSN: 1390-650X. Available at: http://www.redalyc.org/articulo.oa?id=505554806007
Rueda, JE., Romero, AL., and Castro, LM. 2005. "Criptografía Digital Basada En Tecnología Óptica". Bistua: Revista de la Facultad de Ciencias Básicas, vol. 3, núm. 2, julio 2005, pp. 19-25. ISSN: 0120 - 4211. Universidad de Pamplona, Colombia. Available at: http://www.redalyc.org/articulo.oa?id=90330203
Singh, S. 2000. "Los códigos secretos", Madrid: Debate (ISBN: 9788483062784), Madrid, España. Available at: https://scholar.google.com.mx/scholar?hl=es&as_sdt=0%2C5&q=Los+c%C3%B3digos+ secretos&btnG=#d=gs_qabs&t=1744657839049&u=%23p%3DB4VAJ9oiNSQJ
Susilo, W., Tonien, J., and.Yang, G. 2021. "Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA", Computer Standards & Interfaces (ISSN: 0920-5489), vol. 74 (1): 103470, february, doi: https://doi.org/10.1016/j.csi.2020.103470. Available at: https://www.sciencedirect.com/science/article/pii/S0920548920303561
Baklaga, L. 2024. "Leading The Way In Quantum-Resistant Cryptography For Everyday Safety". Scientific and Practical Cyber Security Journal (SPCSJ), 8(3): 65-73. ISSN: 2587-4667. Scientific Cyber Security Association (SCSA).Tbilisi, Georgia. Available at: https://journal.scsa.ge/papers/leading-the-way-in-quantum-resistant-cryptography-for-everyday-safety/
Bavdekar, R., Eashan-Jayant C., Ankit A., and Tiwari, K. 2023. "Post Quantum Cryptography: A Review of Techniques, Challenges, and Standardizations." In 2023 International Conference on Information Networking (ICOIN).
Dhany, HW., Izhari, F., Fahmi, H.,Tulus, M., and Sutarman, M. 2018. "Encryption and Decryption using Password Based Encryption, MD5, and DES". Published by Atlantis Press. ISSN: 2352-5398. Available at: http://creativecommons.org/licenses/by-nc/4.0/,
Kumar, A., and Sharma, S. 2021. "A Study on Historical Cryptographic Techniques: Caesar Cipher to DES". International Journal of Advanced Science and Technology, 30(2), 555-564
Progress Software Corporation, Telerik. 2022. "Cifrado Y Transferencia De Archivos: Los Mejores Cifrados Seguros Para La Transferencia De Archivos". Ipswitch Blogs (2020-2022). Access/Revisión: 31-08-2024. Available at: https://ipswitch.com/amp/es/los-mejores-cifrados-seguros-para-la-transferencia-de-archivos/
Rodríguez, J. 2020. "Operadores Genéticos Aplicados A La Criptografía Simétrica". Proyecto De Grado. Universidad Distrital Francisco José De Caldas. Facultad De Ingeniería. Ingeniería De Sistemas. Bogotá, Colombia. Available at: https://repository.udistrital.edu.co/handle/11349/28192
Van, HC., and Jajodia, S. 2011. "Encyclopedia Of Cryptography And Security". Springer Science & Business Media, 2011. 1416p. ISBN: 978-14419-5907-2.
Van-Tilborg, HCA. 2005. "Encyclopedia Of Cryptography And Security". Springer, pp 114-115, 201-202. TUE Research portal. Available at: https://doi.org/10.1007/0-387-23483-7,
Rahman, M.S., and Hossain, M.S. 2021. "A Secure Private Key Cryptography Scheme Using RSA and AES". Journal of Cybersecurity, 1(1), 1-9.
Singh, P., and Kumar, P. 2022. "Optical encryption using fractional Fourier transform and spiral phase plate". Optics Communications, 503, 127629.
Daemen, J., and Rijmen, V. 2002. "The Design of Rijndael: AES - The Advanced Encryption Standard". Springer. DOI:10.1007/978-3-662-04722-4,
NIST. 2001. "FIPS PUB 197: Advanced Encryption Standard (AES)". U.S. Department of Commerce
Dang, QH., and Le, HQ. 2022. "Improved cryptanalysis of the RSA algorithm using side-channel attacks". Journal of Information Security and Applications, 65, 103313. 00
Luciano, D., and Prichett, G. 1987. "Cryptology: From Caesar Ciphers To Public-key Cryptosystems". The College Mathematics Journal, vol 18 pp 2-17. Available at: http://www.jstor.org/stable/2686311
Hankerson, D., Hernandez, JL., and Menezes, AJ. 2004. "Software implementation of elliptic curve cryptography over binary fields". K. Ko¸c and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 1–24, 2000. Springer-Verlag Berlin Heidelberg 2000. Available at: https://idp.springer.com/authorize?response_type=cookie&client_id=springerlink&redirect_uri=https%3A%2F%2Flink.springer.com%2Fcontent%2Fpdf%2F10.1007%2F3-540-44499-8_1.pdf
Montgomery, PL. 1987. "Speeding up the Pollard rho method". Mathematics of Computation, 48(177), 453-456.
Rivest, R. L., Shamir, A., and Adleman, L. 1978. "A method for obtaining digital signatures and public-key cryptosystems". Communications of the ACM, 21(2), 120-126. Available at: https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://people.csail.mit.edu/rivest/Rsapaper.pdf&ved=2ahUKEwjg2fiM2qGMAxXbhu4BHe9iCSsQFnoECDUQAQ&usg=AOvVaw1FtI2T7P32pKAb6jnZSqxi
Baker, M., and Schiller, J. 2015. "ECIES: Elliptic Curve Integrated Encryption Scheme". In Cryptography and Network Security, pp. 245-263. Springer. Available at: https://medium.com/asecuritysite-when-bob-met-alice/elliptic-curve-integrated-encryption-scheme-ecies-encrypting-using-elliptic-curves-dc8d0b87eaa
NIST. 2013. "Special Publication 800-56A Revision 2: Recommended methods for key establishment using public key cryptography". NIST Special Publication 800-56A. Available at: (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-56ar2.pdf&ved=2ahUKEwio1eCz3KGMAxWgJ0QIHYc4BXQQFnoEC BsQAQ&usg=AOvVaw367-qADImRilvhabe1UtQr)
Iavich, M., Kuchukhidze, T., and Gagnidze, A. 2024. "Post-quantum Digital Signature Using Verkle Trees And Lattices". Scientific and Practical Cyber Security Journal (SPCSJ), 8(3): 35-52. ISSN: 2587-4667. Scientific Cyber Security Association (SCSA). Tbilisi, Georgia. Available at: https://journal.scsa.ge/issues-archive/
Fuegner, P. 2024. "Are RSA and AES Both at Risk From the Quantum Threat?". QuSecure, Inc. Available at: https://www.qusecure.com/are-rsa-and-aes-both-at-risk-from-the-quantum-threat/#:~:text=The%20emergence%20of%20quantum%20computers,efficiently%20factoring%20large%20prime%20numbers
Sengupta, S., and Ghosh, S. 2023. "Quantum Computing Encryption Threats: Why RSA and AES Are at Risk". Journal of Cryptographic Research
Thakur, J., and Kumar, N. 2011. "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis". International Journal of Emerging Technology and Advanced Engineering, 6-12
Iyengar, S. S., Kannan, R., and Ganapathi, S. 2021a. "Inteligencia artificial y criptografía: Tendencias y desafíos". IEEE Transactions on Emerging Topics in Computing, 9(2), 833-844
Li, J., and Wang, X. 2022. "New Collision Attacks on SHA-1 Based on Differentiated Path Construction". Journal of Cryptology, 35(3), 1-25.
Singh, A.K., Kumar, P., and Singh, R. 2021. "Aplicación de la inteligencia artificial en la criptografía: Una revisión". Journal of Intelligent Information Systems, 67(2), 257-275
Rangel, E. 2002. "Vecinos Envolventes para Variantes de la Regla del Vecino más Cercano". MSc.Thesis, Instituto Tecnológico de Toluca, México
Hartmann, AK. 2020. "Heuristic search in graphs". Journal of Artificial Intelligence Research, 68, 1-33.
Russell, SJ., and Norvig, P. 2020. "Inteligencia artificial: Un enfoque moderno", (4ª ed.). Pearson
Sánchez, JS., Pla, F., and Ferri, FJ. 1997. "Prototype selection for the nearest neighbor rule through proximity graphs". Pattern Recognition Letters 18, 507-513.
Mitchell, TM. 2020. "Machine learning", (2ª ed.). McGraw-Hill.
Ross-Quinlan, J. 1993. "C4.5: Programs for Machine Learning". Morgan Kaufmann, San Mateo, CA.
Kuncheva, LI., and Jain, LC. 1999. "Nearest Neighbor Classifier: Simultaneous editing and feature selection". Pattern Recognition Letters, 20, 1149-1156.
Murphy, KP. 2022. "Probabilistic machine learning: An introduction". MIT Press
Reddaiah, B. 2016. "A Study on Pairing Functions for Cryptography". IJCA (0975-8887), Vol. 149, No. 10, September, pp.4-7
Skalak, DB. 1994. "Prototype and Feature Selection by Sampling and Random Mutation Hill Climbing Algorithms". In: Proceedings of the Eleventh International Conference on Machine Learning (ML94). Morgan Kaufmann, pp. 293-301.
Bishop, C.M. 2022. "Pattern recognition and machine learning", (2ª ed.). Springer
Kanal, L.N. 1963. "Statical methods for pattern classification". Philco Rept, originally appeared in T. Harley et al., Semi-automatic imagery screening research study and experimental investigation, Philco Reports, V043-2 and v043-3, Vol. I, sec. 6 and Appendix H, prepared for U.S. Army Electronics Research and Development Lab. Under Contract DA-36-039-sc-90742, March 29
Johns, M.V. 1961. "An empirical Bayes approach to non-parametric two-way classification". In Studies in Item Analysis and Prediction, H. Solomon, Ed Stanford, Calif,: Standford University Press
Sebestyen, G. 1962. "Decision Making". Process in Pattern Recognition. New York: Macmillan, pp. 90-92
Chen, X., and Wang, J. 2022. "Quantum machine learning: A survey". Information Sciences, 593, 257-275
Goodfellow, I., Bengio, Y., and Courville, A. 2021. "Deep learning". MIT Press.
Nils-Nilson. 1965. "Learning Machines". New York: McGraw Hill, pp 120-121.
Han, J., Pei, J., and Kamber, M. 2022. "Data mining: Concepts and techniques", (4ª ed.). Morgan Kaufmann.
Hand, D., Mannila, H., and Smyth, P. 2001. "Principles of Data Mining". The MIT Press.
Tan, P.N., Steinbach, M., and Kumar, V. 2022. "Introduction to data mining", (2ª ed.). Pearson.
Zhang, Y., and Yang, Q. 2022. "Deep learning for data mining: A survey". ACM Computing Surveys, 54(2), 1-37.
Goodfellow, I., Bengio, Y., & Courville, A. 2016. "Deep learning". MIT Press.
Krizhevsky, A., Sutskever, I., and Hinton, G. E. 2012. "ImageNet classification with deep convolutional neural networks". Advances in Neural Information Processing Systems, 25.
LeCun, Y., Bengio, Y., and Hinton, G. 2015. "Deep learning". Nature, 521(7553), 436-444.
Clark, A. 1994. "Modern optimisation algorithms for cryptanalysis". In Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems, November 29 December 2, (pp. 258-262).
Griindlingh, W., and Van-Vuuren, JH. 2002. "Using Genetic Algorithms to Break a Simple Cryptographic Cipher". Retrieved March 31, 2003 from http://dip.sun.ac.za/~vuuren/abstracts/abstr_genetic.htm
Matthews, RAJ. 1993. "The use of genetic algorithms in cryptanalysis". Cryptologia, 17(4), 187-201
Bruzzone, L., and Serpico, S.B. 1997. "Classification of Imbalanced remote-sensing data by neural networks". Elsevier Science B.V. , 0167-8655, 97. PH S0167-8655 (97) 00109-8
Rangel, E., and Rangel, KU. 2024b. "La Regla Del Vecino Más Cercano Como Alternativa Para Inyectar Ruido A Mensajes Encriptados Por El Algoritmo: Noised Random Hexadecimal". INTELETICA. Revista de Inteligencia Artificial, Ética y Sociedad. 1, 2 (Dec. 2024), 1–15. Editado por IBERAMIA (Iberoamerican Society of Artificial Intelligence: Sociedad Iberoamericana de Inteligencia Artificial). ISSN: 3020-7444. España. Available at: https://inteletica.iberamia.org/index.php/journal/article/view/16
Bošnjak, L., Sres, J., and Brumen, B. 2018. "Brute-force and dictionary attack on hashed real-world passwords". Conference: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). DOI: 10.23919/MIPRO.2018.8400211. Available at: https://www.researchgate.net/publication/326700354_Brute-force_and_dictionary_attack_on_hashed_real-world_passwords
Python.org. 2024. "The Python Network". Python.org. Available at: https://www.python.org/downloads/
Pydroid3 versión 7.4_arm64. 2024. [IDE for Python 3. Lenguaje de programación y compilador]. Google Play Store. Available at: https://play.google.com/store/apps/details?id=ru.iiec.pydroid3&hl=en&pli=1
PyCryptodome. 2025. "Crypto.Cipher package. Introduction". Available at: https://pycryptodome.readthedocs.io/en/latest/src/cipher/cipher.html
PyPI. 2024. "Pycryptodome 3.21.0". Python Software Foundation. Available at: https://pypi.org/project/pycryptodome/
ECIESPy. 2025. "ECIESPy 0.4.4". Python Software Foundation. Available at: https://pypi.org/project/eciespy/