SECURE CHAT APPLICATION

Authors

  • 1 CH.VIJAY SHANTI, 2 A. TEJASWINI , 3 K. SAMHITHA SREE, 4 B.NAVYA,5 J. HARSHAVARDHINI Author

DOI:

https://doi.org/10.64751/

Abstract

This paper presents the development
of an Android-based application designed to provide
secure, real-time communication between users
using the Advanced Encryption Standard (AES)
algorithm. With the rapid increase in the number of
users on digital platforms, there is also a
corresponding rise in unauthorized access attempts,
leading to significant data security concerns.
Ensuring the safe transmission of sensitive and
confidential information over potentially insecure
communication channels has therefore become a
critical requirement.
The proposed system addresses these challenges
by implementing AES encryption and decryption
techniques to protect messages exchanged within the
application. This ensures that all transmitted data
remains confidential and protected from
unauthorized interception or attacks. To further
enhance security, access to the application is
restricted through biometric authentication,
allowing only authorized users to open and use the
app. In addition to biometric security, an extra layer
of protection is introduced through a One-Time
Password (OTP) mechanism. Users are required to
enter a dynamically generated OTP each time they
attempt to send a message, preventing unauthorized
individuals from sending messages on behalf of the
user. This multi-layered security approach
significantly reduces the risk of data breaches and
ensures the authenticity and integrity of
communication. Overall, the proposed application
offers a robust and reliable solution for secure
messaging by combining encryption, biometric
verification, and OTP-based authentication, thereby
addressing modern cybersecurity challenges in
communication systems.

Downloads

Published

16-04-26

How to Cite

1 CH.VIJAY SHANTI, 2 A. TEJASWINI , 3 K. SAMHITHA SREE, 4 B.NAVYA,5 J. HARSHAVARDHINI. (2026). SECURE CHAT APPLICATION. American Journal of AI Cyber Computing Management, 6(2). https://doi.org/10.64751/