DSpace Repository

Hybrid Encryption Model for Secure Token Distribution Scheme

Show simple item record

dc.contributor.author Ayuma, Michael Juma
dc.contributor.author Angolo, Shem Mbandu
dc.contributor.author Kasyoka, Philemon Nthenge
dc.date.accessioned 2026-05-13T13:23:32Z
dc.date.available 2026-05-13T13:23:32Z
dc.date.issued 2026-03-16
dc.identifier.citation Ayuma, M.J., Angolo, S.M., Kasyoka, P.N. (2026). Hybrid Encryption Model for Secure Token Distribution Scheme. Journal on Internet of Things, 8(1), 31–65. https://doi.org/10.32604/jiot.2026.074919 en_US
dc.identifier.uri https://doi.org/10.32604/jiot.2026.074919
dc.identifier.uri https://repository.cuk.ac.ke/handle/123456789/1936
dc.description A Journal article published in the Tech Science Press. en_US
dc.description.abstract Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security of the entire authentication process. This study aims to design an efficient cryptographic protocol for the secure transmission of tokens by investigating existing encryption techniques and developing a hybrid cryptographic scheme. Unlike traditional encryption methods, hybrid cryptography combines multiple encryption algorithms to enhance security, making it more resilient against various types of attacks. Previous applications have shown that hybrid cryptography can effectively ensure confidentiality and prevent unauthorized access to highly sensitive information, such as user credentials and authentication tokens. The proposed model integrates Secure Hash Algorithm (SHA-2), ChaCha20, and Rivest-Shamir-Adleman (RSA). SHA-2 is used to ensure the integrity and confidentiality of the data, providing protection against brute force and relay attacks during token transmission. ChaCha20, a symmetric encryption algorithm, is employed to securely generate private keys for encrypting the tokens, while RSA, an asymmetric encryption method, facilitates secure key exchange within the hybrid system. The design is based on computational complexity theory, where the increased complexity of encryption operations significantly strengthens the system against adversarial attacks. This hybrid encryption model specifically addresses the security of token transmission, offering a robust solution for secure token distribution across diverse fields such as healthcare, education, agriculture, and commerce. By evaluating the impact of adversarial models on hybrid encryption schemes, the study provides insights into mitigating security risks and improving the resilience of token transmission systems. en_US
dc.language.iso en en_US
dc.publisher Tech Science Press en_US
dc.relation.ispartofseries Vol 8,2026;
dc.subject Token security. en_US
dc.subject Hybrid cryptography. en_US
dc.subject Encryption. en_US
dc.subject Data integrity. en_US
dc.subject Token transmission. en_US
dc.title Hybrid Encryption Model for Secure Token Distribution Scheme en_US
dc.type Animation en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account