Gid Crypto: Application for End-to-End Encrypt and Decrypt E-mail and Data

Main Article Content

Alain Jean
Tossaporn Alherbe


Privacy and security in our digital environment have become essential today. Some data stored on hard disks, in flash memory, or exchanged through our communication channels is sensitive and should be kept confidential. Additionally, documents containing confidential information, such as business algorithms or new application coding, require adequate measures to ensure privacy and security. Therefore, data encryption is crucial in protecting information from being intercepted, misused, or stolen. While encryption tools are available for business e-mails, using these tools often requires subscribing as a member and paying extra fees. Effective tools are not limited to e-mail alone. Still, they can also be applied to any text data that requires a high level of security and complexity to ensure the protection of the data for a duration longer than it needs to be safeguarded. Our research aims to develop a stand-alone application that encrypts data to ensure its confidentiality without additional subscriptions or fees. The application is designed to be user-friendly, with fast encryption and decryption capabilities. It can be used not only for encrypting and decrypting e-mail messages but also for programming languages and Excel data. The application development utilizes techniques such as Diffe-Hellman, Mersenne Twister, and AES, arranged in layers to generate complex ciphertext that is difficult to decrypt without the developed application. LabVIEW was used for testing encryption speed. The attempt to attack encrypted data was subjected, but the result yielded no successful key retrieval.

Article Details

Research Articles


cloudHQ. (2021, April 6). 50 Years of E-mail. CISSION.

Radicaati Team (2021, February 22). E-mail Statistics Report, 2021-2025. Statista Radicati,

Ghali, C.; Stubblefield, A.; Knapp, E.; Li, J.; Schmidt, B.; Boeuf, J. (2017, December 27), Application Layer Transport Security, Google Cloud whitepaper.

Nohe, P. (2018, October 15), Apple, Microsoft, Google Announce Plans to Disable TLS 1.0, TLS 1.1. hashedout.

Just, M. Diffie-Hellman Key Agreement. In Van Tilborg H.C.A. (Eds.), Encyclopedia of Cryptography and Security (pp. 154-163). Springer. 2005.

Jagannatam, A. (2008), Mersenne Twister – A Pseudo Random Number Generator and its Variants. [Technical report, Department of Electrical Computer Engineering, George Mason University].

Kak, A. Lecture 8: AES: The Advanced Encryption Standard, Lecture Notes on Computer and Network Security, Purdue University. 2020.

O S. N.; Vankamanidi S. N. Comparative Analysis of MOD-ECDH Algorithm and Various Algorithms. Journal of Industrial Engineering & Production Research. 2020, 31(2), 302-308.

Hamid N.; Nikil D.; Sandip R.; Francesco R.; Indranil B.; Rosario C. Post-quantum Lattice-based Cryptography Implementations: A Survey. ACM Computing Surveys. 2019, 51(6), 1-41.

Tain, X.; Benkrid, K. (2009, July 29 – August 1). Mersenne Twister random number generation on FPGA, CPU and GPU NASA/ESA [Conference session]. 2009 Conference on Adaptive Hardware and System, San Franciso, CA, United States.

Vigna, S. (2019, November 14). Is it high time we let go of the Mersenne Twister. Arxiv.

Rimkienė, R. (2022, August 29), What is AES encryption and how does it work?. Cybernews,

Schwenk, J. Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Springer. 2022.

Kiltz, E., O’Neill A.; Smith, A. Instantiablity of RSA_OAEP Under Chosen-Plaintext Attacj. Journal of Cryptology. 2017, 30(1), 889-919.

Huang, Z.; Liu, S.; Qin, B. Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Journal of Applied Mathematics and Computer Science. 2015. 25(2), 369-389.

Latif, I. H. (2021, August 14). Time Evaluation Of Different Cryptography Algorithms Using Labview [Confernce session]. The 4th Postgraduate Engineering Conference in Materials Science and Engineering, Baghdad, Iraq.

Microsoft (2023, July 31). Preparing for TLS 1.2 in Office 355 and Office 365 GCC. Microsoft,

egress (2021, January 17). How to encrypt Outlook e-mails in transit. egress.

Microsoft 365 (2023, August 8), E-mail encryption. Microsoft,

Posteo (2021, December 12). POSTEO: E-mail, calendar, address, book, notes. POSTEO.

Tutanota (2022, March 25). Tutanota Secure e-mail for everybody. Tutanota.

Lalabit (2022, June 10). Secure e-mail for the world. Lavabit. 2022.

Trustifi, (2022, October 7). Trustifi E-mail Security that is Easy to Deploy, Manage, and Use. Trustifi.

Preveil, (2022, August 19). Preveil Simple Secure Compliment. Preveil.

Signal, (2022, Febuary 26). Speak Freely. Signal.

Livington, J. D.; Kirubakarn, E.; Johnraja, J. I (2021, August 4). Implementing Client-Side Encryption for Enforcing Data Privacy on the Web Using Symmetric Cryptography: A Research Paper [Conference session]. Third International Conference on Information Management and Machine Intelligence, Singapore.

Moon, M. E.; Colonel, M. E. How America Lost its Secrets: Edward Snowden, The Man and The Thief By Edward Jay Epstein New York, N.Y.; Alfred A. Knopf. Journal of Strategic Security. 2017, 10(1), 143-147.