GUI-Based Secure Encryption and Decryption

Authors

  • Indu U
  • Tabitha Janumala

Keywords:

Decryption, Encryption, Elliptic Curve Cryptography (ECC), Graphical User Interface (GUI), Two-Factor Authentication (2FA)

Abstract

This paper presents the development of a GUI-based encryption and decryption tool designed to secure textual messages using the Columnar Transposition Cipher. The tool is developed using Python programming language within the Visual Studio IDE, ensuring ease of development and integration. The tool is designed to provide an intuitive interface, allowing users to input messages and keywords for encryption and decryption operations, with password protection for security. The Columnar Transposition Cipher rearranges the message based on a keyword, providing basic encryption functionality. The paper highlights the effectiveness of using Python for rapid development and the importance of GUI-based tools in making encryption accessible to non-expert users. The tool is tested for accuracy, security, and usability, and future enhancements, including advanced encryption algorithms and multi-user support, are discussed.

References

K. Sujitha, R. V. Reddy, Vemuri, L. L. N. V. S. R. K. S. Surya, and S. Jha, “A GUI Frame work for Homomorphic Encryption Operations,” International Journal of Engineering Research & Technology, vol. 13, no. 3, Mar. 2024, doi: https://doi.org/10.17577/IJERTV13IS030033.

S. K. Mandal, A. Sharma, S. K. Henge, S. Bashir, M. Shukla, and A. T. Pathak, “Secure data encryption key scenario for protecting private data security and privacy,” Journal of Discrete Mathematical Sciences & Cryptography/Journal of discrete mathematical sciences & cryptography, vol. 27, no. 2, pp. 269–281, Jan. 2024, doi: https://doi.org/10.47974/jdmsc-1881.

M. Singh, S. Shrivastava, and Singh, “Design and Implementation of a Multi-Algorithm Encryption and Decryption Framework,” 2024. Available: https://www.ijisrt.com/assets/upload/files/IJISRT24DEC071.pdf

S. Joshi and R. Mehra, “GUI based Approach for Data Encryption and Decryption on MATLAB Platform,” International Journal of Computer Applications, vol. 181, no. 16, pp. 14–18, Sep. 2018, doi: https://doi.org/10.5120/ijca2018917758.

Yadav, N. Aamer, and A. Shinde, “WebApp for File Encryption and Decryption,” ResearchGate, vol. 10, no. 3, 2022, doi: https://doi.org/10.15680/IJIRCCE.2022.1003029.

K. Shahzad, T. Zia, and E.-H. Qazi, “A Review of Functional Encryption in IoT Applications,” Sensors, vol. 22, no. 19, p. 7567, Oct. 2022, doi: https://doi.org/10.3390/s22197567.

Md. S. Hossen, “A Java Based GUI Application for Substitution Encryption Techniques,” Academia.edu, Jul. 17, 2017. Available: https://www.academia.edu/33909410/A_Java_Based_GUI_Application_for_Substitution_Encryption_Techniques

Published

2025-06-10

How to Cite

Indu U, & Tabitha Janumala. (2025). GUI-Based Secure Encryption and Decryption. International Journal of Data Science, Bioinformatics and Cyber Security, 1(1), 57–62. Retrieved from https://www.matjournals.net/engineering/index.php/IJDSBCS/article/view/2003