DESIGN AND IMPLIMENTATION OF AN END-TO-END ENCRYPTED COMMUNICATION
The proliferation of embedded systems and the development of IoT (Internet of Things) technology have led to the increased need for safe and timely communication between these technologies. In this regard, this project named "Design and Implementation of End-to-End Encrypted Communication Using ESP32" has come up with a highly efficient security communication system which has been developed with the help of two microcontrollers ESP32 used for the role of a Transmitter (Agent A) and a Receiver (Agent B). This communication network uses the mechanism of E2EE (End-to-End Encryption) with the help of cryptographic techniques like AES (Advanced Encryption Standard) for fast symmetric encryption and RSA for exchanging secret keys.
Akash, Y. & raju, M. S. (2026). Design and Implimentation of an End-To-End Encrypted Communication. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.606
Akash, Y, and M raju. "Design and Implimentation of an End-To-End Encrypted Communication." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.606.
Akash, Y, and M raju. "Design and Implimentation of an End-To-End Encrypted Communication." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.606.
2.Arduino, Arduino Programming Reference Manual and Language Guide, 2024.(The official programming guidebook on embedded C/C++ programming language and concepts in microcontroller programming.)
3 Dabola, S., Tomer, V., Singh, N., Madan, P., & Jhinkwan, A. (2024). Chat secure-messaging application based on secure encryption algorithm. International Journal of Research in Advent Technology (IJRASET), 12(III), 1–10. DOI: 10.22214/ijraset.2024.58817
4 Goel, A., Baliyan, H., Tyagi, S., & Bansal, N. (2024). End to end encryption of chat using advanced encryption standard-256. International Journal of Science and Research Archive, 12(1), 2018–2025. DOI: 10.30574/ijsra.2024.12.1.0923
5 Julianto, A. I., Rimbawa, H. A. D., & Asnar, Y. D. W. (2023). Study and analysis of end-to-end encryption message security using Diffie-Hellman key exchange encryption. International Journal of Progressive Sciences and Technologies (IJPSAT), 42(1), 173–183.
6 Saharan, M., Kumar, N., Kumar, V., & Juneja, A. (2024). Secure end-to-end chat application: A comprehensive guide. Review of Computer Engineering Studies, 11(3), 1–8. DOI: 10.18280/rces.110302 [1, 2, 3]
7 Wang, J., et al. (2025). Design and optimization of hybrid end-to-end encryption for modern web applications. Journal of Web Engineering, 24(2), 1–20.