Secure Data Management: An Implementation of Advanced Encryption Standard in a Flutter-Based Notes App
Abstract
Given increasingly critical concerns about data security in the digital age, safeguard of sensitive information in mobile applications due to its global interconnectivity becomes an imperative. This research focuses on the protection of information on mobile applications, demonstrated through the design, development and evaluation of a Flutter-based Notes App that employs an encryption algorithm to ensure confidentiality and integrity of user data. Specifically, this research adopts the 256-bit Advanced Encryption Standard (AES) as the core mechanism of the Notes App, on assumption of its robust security features that it ensures data protection during both storage and transmission. To ascertain the choice, it compares the performance of the AES- 256 against that of 128-bit and 192-bit key sizes using key metrics such as encryption and decryption time, memory usage, power consumption, and error rate. Programmatically generated dataset, alongside graphical analyses, where used to illustrate the performance differences across the three key sizes. Findings from the aforementioned, reveal that while AES-256 incurs marginally higher resource usage compared to its smaller key-size counterparts, it delivers significantly enhanced security. The increase in processing time and memory usage shows a negligible impact on performance, affirming its practicality for real-world applications. The seamless operation of the Notes App during encryption and decryption processes further validated the suitability of AES-256 for mobile platforms. It is therefore safe to conclude that AES-256 provides the optimal balance between security and performance, thus makes it the preferred choice for protecting sensitive information in mobile applications.
Keywords
Full Text:
PDFReferences
Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16(1), 11.
Ahmad, R., Omar, M. F. M., Rajendran, J., & Ismail, W. (2022). Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. *Wireless Personal Communications*, 127(4), 3615–3635. https://doi.org/10.1007/s11277-022-09866-8.
Aljuffri, A., Huang, R., Muntenaar, L., Gaydadjiev, G., Ma, K., Hamdioui, S., & Taouil, M. (2024). The Security Evaluation of an Efficient Lightweight AES Accelerator. Cryptography, 8(2), 24. https://doi.org/10.3390/cryptography8020024[](https://www.mdpi.com/2410-387X/8/2/24).
Alsmadi, I. M., Al-Kasasbeh, B. M., & Al-Azzam, M. (2021). Mobile Application Security: Challenges and Solutions in Development Practices. *Journal of Information Security and Applications*, 61, 102945. https://doi.org/10.1016/j.jisa.2021.102945.
Barker, E., & Roginsky, A. (2019). Transitioning the Use of Cryptographic Algorithms and Key Lengths. NIST Special Publication 800-131A, Revision 2. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf.
Bhagat, S. A. (2022). Review on mobile application development based on Flutter platform. International Journal for Research in Applied Science and Engineering Technology, 10(1), 803-809.
Chandu, Y., Kumar, K. S. R., Prabhukhanolkar, N. V., Anish, A. N., & Rawal, S. (2017). Design and implementation of hybrid encryption for security of IOT data. 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). doi:10.1109/smarttechcon.2017.835.
Chawla, N., Kumar, A., & Kumar, B. (2023). Hardware Security of Fog End-Devices for IoT Systems: A Study and Review. IETE Technical Review, 40(2), 181–194. https://doi.org/10.1080/02564602.2022.2046667.
Cho, C., Kim, B., Cho, H., & Taek-Young, Y. (2025). A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment. Computer Modeling in Engineering & Sciences, 142(1), 813.
Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-04722-4.
Daemen, J., & Rijmen, V. (2020). The advanced encryption standard process. In The Design of Rijndael: The Advanced Encryption Standard (AES) (pp. 1-8). Berlin, Heidelberg: Springer Berlin Heidelberg.
Kinari, S. A., Funabiki, N., Aung, S. T., Wai, K. H., Mentari, M., & Puspitaningayu, P. (2024). An independent learning system for Flutter cross-platform mobile programming with code modification problems. Information, 15(10), 614.
Kusumaningsih, A., Angkoso, C. V., & Ubaidillah, A. (2020, July). Augmented Reality-Marker Detection Measurement on Heroes of Surabaya Mobile Games. In Journal of Physics: Conference Series (Vol. 1569, No. 2, p. 022066). IOP Publishing.
Li, K., Li, H., & Mund, G. (2023). A reconfigurable and compact subpipelined architecture for AES encryption and decryption. EURASIP Journal on Advances in Signal Processing, 2023(1), 5.
National Institute of Standards and Technology (2001). Federal Information Processing Standards Publication 197: Announcing the Advanced Encryption Standard (AES). https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf.
Naveen, P. V., & Poongodi, A. (2023, December). Development of Secure Framework in Mobile Cloud Computing Using AES-HMAC Encryption Approach. In International Conference on Advancements in Smart Computing and Information Security (pp. 192-206). Cham: Springer Nature Switzerland.
Priyanka Brahmaiah, V., Jaswantth, P. V., Sri Likhitha, D., & Pallavi Sudha, M. (2023, April). Implementation of AES Algorithm. In International Conference on Information and Communication Technology for Intelligent Systems (pp. 161-171). Singapore: Springer Nature Singapore.
Rifki, M. I., & Syamia, N. (2024). Message Security Application Using Mobile-Based AES Algorithm. Journal of Computer Science, Information Technology and Telecommunication Engineering, 5(2), 595-606.
Tayde, S., & Siledar, S. (2015). File Encryption Decryption using AES algorithm in android phone. International Journal of Advanced Research in computer science and software engineering, 5(5).
Thabit, F., Can, O., Aljahdali, A. O., Al-Gaphari, G. H., & Alkhzaimi, H. A. (2023). Cryptography algorithms for enhancing IoT security. Internet of Things, 22, 100759.
DOI: https://doi.org/10.30596/jcositte.v7i1.26969
Refbacks
- There are currently no refbacks.




.png)

