{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:34:11Z","timestamp":1761294851526,"version":"3.41.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04007-z","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T12:12:14Z","timestamp":1748002334000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Strengthening Digital Security through a Hybrid Encryption Algorithm for Messages on WhatsApp"],"prefix":"10.1007","volume":"6","author":[{"given":"Benjam\u00edn","family":"Maraza-Quispe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9711-2807","authenticated-orcid":false,"given":"V\u00edctor Hugo","family":"Rosas-Iman","sequence":"additional","affiliation":[]},{"given":"Ramiro Max","family":"Solorzano-Bernuy","sequence":"additional","affiliation":[]},{"given":"Leonor","family":"Casa-Zeballos","sequence":"additional","affiliation":[]},{"given":"Miguel Angel","family":"Ttito-Sua\u00f1a","sequence":"additional","affiliation":[]},{"given":"Giuliana","family":"Feliciano-Yucra","sequence":"additional","affiliation":[]},{"given":"Atilio Cesar","family":"Martinez-Lopez","sequence":"additional","affiliation":[]},{"given":"Lita Marianela","family":"Quispe-Flores","sequence":"additional","affiliation":[]},{"given":"Nicol\u00e1s Esleyder","family":"Caytuiro-Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"issue":"1","key":"4007_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.52465\/joscex.v3i1.65","volume":"3","author":"A Nurdin","year":"2022","unstructured":"Nurdin A, Djuniadi D. Securing audio chat with cryptool-based twofish algorithm. J Soft Comput Explor. 2022;3(1):37\u201343.","journal-title":"J Soft Comput Explor"},{"issue":"2","key":"4007_CR2","first-page":"61","volume":"2","author":"DA Agustina Pertiwi","year":"2021","unstructured":"Agustina Pertiwi DA, Djuniadi D. Simulations of text encryption and decryption by applying vertical bit rotation algorithm. J Soft Comput Explor. 2021;2(2):61\u20136.","journal-title":"J Soft Comput Explor"},{"issue":"1","key":"4007_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/1235\/1\/012030","volume":"1235","author":"A Rahman Dalimunthe","year":"2019","unstructured":"Rahman Dalimunthe A, Mawengkang H, Suwilo S, Nazam A. Vernam cipher with complement method and optimization key with genetic algorithm. J Phys: Conf Series. 2019;1235(1):1\u20135. https:\/\/doi.org\/10.1088\/1742-6596\/1235\/1\/012030.","journal-title":"J Phys: Conf Series"},{"issue":"1","key":"4007_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.15294\/sji.v6i1.17589","volume":"6","author":"HDJRH Utami","year":"2019","unstructured":"Utami HDJRH, Arifudin R, Alamsyah A. Security login system on mobile application with implementation of advanced encryption standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit. Scientific J Inform. 2019;6(1):34\u201344.","journal-title":"Scientific J Inform"},{"issue":"1","key":"4007_CR5","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/ESCI50559.2021.9396926","volume":"I","author":"S Sanap","year":"2021","unstructured":"Sanap S, Vijayshree M. Analysis of encryption techniques for secure communication. Int Conf Emerging Smart Comput Inform (ESCI). 2021;I(1):290\u20134. https:\/\/doi.org\/10.1109\/ESCI50559.2021.9396926.","journal-title":"Int Conf Emerging Smart Comput Inform (ESCI)"},{"issue":"1","key":"4007_CR6","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.matpr.2020.03.132","volume":"I","author":"M Vijayalaxmi","year":"2020","unstructured":"Vijayalaxmi M, Arjun R, Airani K. Complex key generation with secured seed exchange for Vernam cipher in security applications. Mater Today: Proceed. 2020;I(1):497\u2013500. https:\/\/doi.org\/10.1016\/j.matpr.2020.03.132.","journal-title":"Mater Today: Proceed"},{"issue":"2","key":"4007_CR7","first-page":"99","volume":"3","author":"NS Gadinga","year":"2022","unstructured":"Gadinga NS, Siagian F. Implementation of the data encryption using Cesar cipher and Vernam cipher methods based on CrypTool2. J Soft Comput Explor. 2022;3(2):99\u2013104.","journal-title":"J Soft Comput Explor"},{"key":"4007_CR8","doi-asserted-by":"crossref","unstructured":"G. Deepanshu, S. Parth, S. Poonam, A. Chandan and M. Munish (2019) \u201cAn Enhanced Cipher Technique using Vigenere and Modified Cesar Cipher,\u201d 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 6(5):1\u20136","DOI":"10.1109\/ICOEI.2018.8553910"},{"issue":"1","key":"4007_CR9","first-page":"1","volume":"1","author":"D Aulia Rahman","year":"2019","unstructured":"Aulia Rahman D, Herman M, Saib S, Ahmad N. Vernam cipher with complement method and optimization key with genetic algorithm. J Phys: Conf Series. 2019;1(1):1\u20135.","journal-title":"J Phys: Conf Series"},{"issue":"2","key":"4007_CR10","first-page":"350","volume":"9","author":"S Parasian","year":"2021","unstructured":"Parasian S, Sorang P. Application of Integers in Vernam Cipher Cryptography (One Time Pad). J Infokum. 2021;9(2):350\u20133.","journal-title":"J Infokum"},{"issue":"1","key":"4007_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.47852\/bonviewJCCE877829","volume":"1","author":"V Raksha","year":"2022","unstructured":"Raksha V, Anjali K, Adarsh A, Yadavalli,. Revisiting shift cipher technique for amplified data security. J Comput Cognitive Eng. 2022;1(1):1\u20137.","journal-title":"J Comput Cognitive Eng"},{"issue":"3","key":"4007_CR12","first-page":"86","volume":"7","author":"B Adnan Adel","year":"2021","unstructured":"Adnan Adel B, Sujatha V. Merging vernam cipher stream and rail fence algorithms and how effective they are on IoT devices. Int J Scientific Res Comput Sci, Eng Inform Technol. 2021;7(3):86\u2013691.","journal-title":"Int J Scientific Res Comput Sci, Eng Inform Technol"},{"issue":"3","key":"4007_CR13","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.30534\/ijatcse\/2020\/72932020","volume":"9","author":"JC Arroyo","year":"2020","unstructured":"Arroyo JC, Allemar Jhone D. A Hybrid Cesar-Polybius Cipher with XOR Operation for Enhanced Cryptography. Int J Adv Trends Comput Sci Eng. 2020;9(3):2961\u20137.","journal-title":"Int J Adv Trends Comput Sci Eng"},{"issue":"2","key":"4007_CR14","first-page":"42","volume":"1","author":"YI Agung Susilo","year":"2020","unstructured":"Agung Susilo YI, Nono H, Solehudin A. Combination of Hill Cipher Algorithm and Cesar Cipher Algorithm for Exam Data Security. Buana Inform Tchnol Comput Sci (BIT and CS). 2020;1(2):42\u20135.","journal-title":"Buana Inform Tchnol Comput Sci (BIT and CS)"},{"issue":"3","key":"4007_CR15","first-page":"45","volume":"3","author":"F Ade Hastuty","year":"2023","unstructured":"Ade Hastuty F. Application of Vernam Cipher Aalgorithm on PHP based Server Protocol File Transfer. J Logical Syntax. 2023;3(3):45\u201352.","journal-title":"J Logical Syntax"},{"issue":"10","key":"4007_CR16","first-page":"559","volume":"27","author":"D Babuc","year":"2023","unstructured":"Babuc D. An authentic algorithm for ciphering and deciphering called Latin Djokovic. Int J Comput Inform Eng. 2023;27(10):559\u201363.","journal-title":"Int J Comput Inform Eng"},{"issue":"1","key":"4007_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app122412578","volume":"12","author":"S Wajiha Zahra","year":"2022","unstructured":"Wajiha Zahra S, Ali A, Muhammad N, Saman R, Ashit Kumar D, Zaid A, Rana A, Badr A, Sultan A. Development of security rules and mechanisms to protect data from assaults. Appl Sci. 2022;12(1):1\u201323. https:\/\/doi.org\/10.3390\/app122412578.","journal-title":"Appl Sci"},{"issue":"2","key":"4007_CR18","first-page":"99","volume":"3","author":"GN Salmi","year":"2022","unstructured":"Salmi GN, Siagian F. Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2. J Soft Comput Explor. 2022;3(2):99\u2013104.","journal-title":"J Soft Comput Explor"},{"issue":"2","key":"4007_CR19","doi-asserted-by":"publisher","first-page":"208","DOI":"10.35870\/jtik.v7i2.716","volume":"7","author":"YC Milian","year":"2023","unstructured":"Milian YC, Sulistyo W. Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher. jtik. 2023;7(2):208\u201316.","journal-title":"jtik"},{"key":"4007_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.procs.2015.07.552","volume":"59","author":"B Purnama","year":"2015","unstructured":"Purnama B, Rohayani AHH. A new modified Caesar cipher cryptography method with LegibleCiphertext from a message to be encrypted. Procedia Comput Sci. 2015;59:195\u2013204. https:\/\/doi.org\/10.1016\/j.procs.2015.07.552.","journal-title":"Procedia Comput Sci"},{"key":"4007_CR21","unstructured":"GeeksForGeeks (2023) \u201cCryptography and its Types,\u201d GeeksForGeeks Learning. https:\/\/www.geeksforgeeks.org\/cryptography-and-its-types"},{"issue":"10","key":"4007_CR22","first-page":"601","volume":"8","author":"DG Brosas","year":"2019","unstructured":"Brosas DG, Sison AM, Medina RP. Strengthening the vernam cipher algorithm using multilevel encryption techniques. Int J Sci Technol Res. 2019;8(10):601\u20136.","journal-title":"Int J Sci Technol Res"},{"key":"4007_CR23","doi-asserted-by":"publisher","unstructured":"H. A. Ali, A. J. Jalil and M. K. Hussein (2021) \u201cVernam encryption and steganography of a number of images in the digital video,\u201d in 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). https:\/\/doi.org\/10.1109\/ICECCME52200.2021.9591058","DOI":"10.1109\/ICECCME52200.2021.9591058"},{"issue":"5","key":"4007_CR24","doi-asserted-by":"publisher","first-page":"9","DOI":"10.35940\/ijsce.F3492.0510521","volume":"10","author":"C Sharma","year":"2021","unstructured":"Sharma C, et al. A novel encryption RAAM algorithm in different multimedia applications. Int J Soft Comput Eng. 2021;10(5):9\u201313.","journal-title":"Int J Soft Comput Eng"},{"key":"4007_CR25","doi-asserted-by":"publisher","unstructured":"R. M. Irodah and A. Adriansyah (2022) \u201cAnalysis and design of self-service local water company (LWC) using vernam cipher cryptography algorithm,\u201d in 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS). https:\/\/doi.org\/10.1109\/ICTACS56270.2022.9987965","DOI":"10.1109\/ICTACS56270.2022.9987965"},{"issue":"1","key":"4007_CR26","doi-asserted-by":"publisher","first-page":"012030","DOI":"10.1088\/1742-6596\/1235\/1\/012030","volume":"1235","author":"A Rahman Dalimunthe","year":"2019","unstructured":"Rahman Dalimunthe A, Mawengkang H, Suwilo S, Nazam A. Vernam Cipher with complement method and optimization key with genetic algorithm. J Phys Conf Ser. 2019;1235(1):012030.","journal-title":"J Phys Conf Ser"},{"key":"4007_CR27","unstructured":"GeeksForGeeks 2023 \u201cCesar Cipher in Cryptography,\u201d GeeksForGeeks. Learning. https:\/\/www.geeksforgeeks.org\/Cesar-cipher-in-cryptography"},{"key":"4007_CR28","unstructured":"GeeksForGeeks, 2023 \u201cVernam Cipher in Cryptography,\u201d GeeksForGeeks. Learning. https:\/\/www.geeksforgeeks.org\/vernam-cipher-in-cryptography"},{"key":"4007_CR29","unstructured":"Glitch 2023 \u201cBuild fast, full-stack web apps in your browser for free\u201d. https:\/\/glitch.com"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04007-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T12:12:19Z","timestamp":1748002339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04007-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["4007"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04007-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,23]]},"assertion":[{"value":"1 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest in relation to the research carried out.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and \/or Animals"}},{"value":"Informed consent has been developed for all those who participated in the surveys and interviews.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"489"}}