[under evaluation 2][Free] Advanced Data Encryption Extension

  • introduction
  • Introducing the Advanced Data Encryption Extension for MIT App Inventor, created by Mr_Kodr. This extension provides a comprehensive set of tools for encrypting and providing a layer of security, including advanced algorithms like AES, RSA, DES, and base-64. It enables users to encrypt data and text with ease, The extension ensures and provides an added layer of security against most of cyber threats ,
    users can confidently protect their important data with a high layer of security

    But all of these methods can be revealed by professional hackers

  • blocks
  • Explenation

  • component_method (13)

    This block "ConvertDuration" takes an argument "timeInMillis" which is the time in milliseconds and converts it to a duration format "hh:mm:ss". It calculates the total number of seconds, hours, minutes and seconds and returns a string in the format "hh:mm:ss". This can be used to format the duration of media files or other time-related data.



    component_method

    This block "ConvertTimeMinutes" also takes an argument "timeInMillis" which is the time in milliseconds and converts it to a duration format "mm:ss". It calculates the total number of minutes and seconds and returns a string in the format "mm:ss". This can be used to format the duration of media files or other time-related data.



    component_method (1)

    This block "ConvertTimeSeconds" also takes an argument "timeInMillis" which is the time in milliseconds and converts it to a duration format "ss". It calculates the total number of seconds and returns a string in the format "ss". This can be used to format the duration of media files or other time-related data.



    component_method (2)

    This block "DecodeBase64" takes a single argument, "encodedText" which is a string representing the encoded text that you want to decode. This function uses the built-in Base64 decoder from the Java standard library to decode the encoded text. The decoder takes the encoded text as an input and returns an array of bytes. The returned byte array is then converted to a string using the new String() constructor and this decoded string is returned as the output of the function. This block can be used to decode any text encoded using the base64 algorithm and can be useful for decoding data that has been encrypted or for decoding encoded data used for authentication.



    component_method

    This block "DecryptAES" also takes two arguments, a key and the encrypted data, and decrypts the data using the AES algorithm. The key must be the same key used to encrypt the data. The function uses the key to create a SecretKeySpec object, which is used to initialize the AES cipher. The cipher is then used to decrypt the data and the original data is returned as a string.



    component_method (6)

    This block "DecryptDES" also takes two arguments, "key" and "encryptedData". The key must be 8 bytes long, and the encryptedData is the message that needs to be decrypted. The function uses the Data Encryption Standard (DES) algorithm to decrypt the data. The decryption is performed using a SecretKeySpec object, which is initialized with the key bytes and the "DES" algorithm. The Cipher object is then initialized with the decryption mode and the secret key, and the data is decrypted using the "doFinal" method. The decrypted data is returned as a string.



    component_method (7)

    This block "DecryptRSA" takes a string argument "encryptedData" which is a base64 encoded string, that was encrypted using the RSA algorithm. The function creates a Cipher object using the RSA algorithm and initializes it with the private key in decryption mode. The encrypted data is then decoded from the base64 string and passed to the doFinal method to decrypt it. The original data is then returned as a string.



    component_method (8)

    This block "EncodeToBase64" takes an argument "text" which is the plain text to be encoded and returns the base64 encoded string of the text. Base64 encoding is a process of converting binary data to a ASCII text format. It is commonly used to transmit binary data over a network connection or to store binary data in a text file.



    component_method (1)

    The function "EncryptAES" takes two arguments, a "key" and a "data" , and encrypts the data using AES encryption algorithm. The key must be a multiple of 8 bytes long could be 16,24, or 32 bytes long. The function uses the key to create a SecretKeySpec object, which is used to initialize the AES cipher. The cipher is then used to encrypt the data and the encrypted data is returned in Base64 encoded format.

    component_method (12)

    This block "EncryptDES" takes two arguments, "key" and "data". The key must be 8 bytes long, and the data is the message that needs to be encrypted. The function uses the Data Encryption Standard (DES) algorithm to encrypt the data. The encryption is performed using a SecretKeySpec object, which is initialized with the key bytes and the "DES" algorithm. The Cipher object is then initialized with the encryption mode and the secret key, and the data is encrypted using the "doFinal" method. The encrypted data is then encoded to base64 and returned as a string.



    component_method (14)

    This block "EncryptRSA" takes a string argument "data" and encrypts it using the RSA algorithm. The RSA algorithm is a public-key encryption algorithm that is widely used to secure sensitive information. The function generates a new key pair using the KeyPairGenerator class and initializes it with a key size of 2048 bits. The public and private keys are then extracted from the key pair and stored in the respective variables. The function then creates a Cipher object using the RSA algorithm and initializes it with the public key in encryption mode. The data is then encrypted using the doFinal method and the encrypted data is encoded to a base64 string and returned.



  • Tutorial
  • The conditions for the key for the AES-128, AES-192 and AES-256 functions is that the key must be multiple of 8 bytes long for example each one of them can accept 16 or 24 or 32 bytes long key.

    The difference between using AES with a key length of 16 bytes, 24 bytes, and 32 bytes is the level of security provided. AES-128, which uses a 128-bit key and input 16-bytes of long key, is considered to provide a good level of security for most uses. AES-192, which uses a 192-bit key and input 24-bytes of long key, provides a higher level of security and is typically used in government and military applications. AES-256, which uses a 256-bit key and input 32-bytes of long key, provides the highest level of security and is typically used in highly sensitive applications such as financial transactions and classified communications.



    For the DES function, the key must be 8 bytes long only.




    For the RSA block, no key length specified, but it is commonly used with a 2048-bit key.

    The base64 function does not have any specific key requirements. It is a method for encoding binary data as ASCII text. The functions that use base64 are primarily used to encode or decode data as a string, rather than encrypting or decrypting it.

  • disclaimer
  • It is important to note that the Advanced Data Encryption Extension for MIT App Inventor is provided for data encryption purposes only as a layer of protection and should not be relied upon to secure data. The author of this extension Mr_Kodr cannot be held responsible for any damages or losses that may result from the use of this extension. In addition, the use of this extension is at the user's own risk and it is the user's responsibility to ensure that their data is properly secured. It is also important to note that no method of data encryption can guarantee 100% security and that users should use multiple methods to protect their data, such as regular backups and frequent updates of encryption algorithms. It is also important to keep in mind that professional hackers with the right tools and knowledge can reveal any encrypted data.

  • Our socials
  • Telegram_channel
    Youtube


  • Download
  • Aix

    âť’ com.mrkoder.Encryption.lol.dev.aix


    Thanks

    1 Like

    Looks good, well introduced. However, the very first task should be to make an off-device backup (Google drive), in case something goes wrong.

    Base64 is usually used to convert image data to an ASCII string - essentially you are saying your Base64 encoder is converting text into text........is that valid?

    I have unlisted because this is a duplicate of your post already under evaluation. You have not responded or completed edits that have been requested.

    @TIMAI2
    sorry but can you tell me exactly what should I edit

    Read the last four posts in the thread, especially by SteveJG.

    Again, there is nothing inherently wrong with your extension, it is the claims that you make:

    ? (entire hard drives ?)

    ok I'll do the requirements

    You should also in some way acknowledge that all the methods you offer have been cracked/broken/successfully attacked (including the AES - ECB method)

    May I suggest, for this Encryption extension, you use the following as your introduction:

    ############################################

    Introduction

    Introducing the Advanced Data Encryption Extension for MIT App Inventor, created by Mr_Kodr. This extension provides a comprehensive set of tools for encoding/encrypting sensitive information, including base64 and advanced algorithms like AES, RSA, DES. It enables users to encode/encrypt data with ease, while also providing a user-friendly interface and options for creating backups of encoded/encrypted data.

    Encoding and Encryption of data is a much debated subject, and many methods have in the past been proven to be insecure. You should do your own research with regard to the security of these encoding and encryption techniques. No simple algorithm is totally secure. You can't guarantee any of these methods is totally secure. The algorithms provide a layer of security that the average person cannot defeat.

    You may find the following links useful:

    (add more links if you do research on your chosen algorithms)

    ############################################

    @TIMAI2 could this topic be accepted?

    You need to edit your introduction to be more like the one I suggested. This removes all the misleading/emotive words and phrases you have used.

    base64 is encoding, not encryption.

    1 Like

    @TIMAI2 is intro good for now

    Why not just use the one I suggested (for the first paragraph at least) ?

    Also, there are no blocks to encode/encrypt files....