INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 3 2025
DOI: 10.56201/ijcsmt.vol.11.no3.2025.pg.98.128


Implementation of Huffman Encoding for Modified RSA-AES Encrypted Token Compression in Secure Banking Transactions

Hamidu M, Sarjiyus O, Manga I


Abstract


This research Huffman encoding for modified RSA-AES encrypted token compression in secure banking transactions aims to improve the security strength of customer banking credentials in transit and at rest by modifying the RSA token generation stage of encryption. These tokens are not original banking credentials but 32-bit decryption keys of AES. This modification will be made possible by using SHA-256 token generation for its historic strength and resistant to brute-force attack. This approach may hinder a serious computational overheat and time-space complexity. However, we propose the use of Huffman encoding with its quicker data compression to overcome the data size intricacy.


keywords:

Sha-256, Avalanche effect, Huffmann encoding, Entropy, Overheat


References:


Abhilash, A., Shenoy, S. S., & Shetty, D. K. (2023). Overview of Corporate Governance Research
in India: A Bibliometric Analysis. Cogent Business & Management, 10(1), 2182361.
https://doi.org/10.1080/23311975.2023.2182361
Agur, I., Peria, S. M., & Rochon, C. (2020). Digital financial services and the pandemic:
Opportunities and risks for emerging and developing economies. International Monetary
Fund
Special
Series
on
COVID-19,
Transactions,
1,
2–1.
https://www.imf.org/~/media/Files/Publications/covid19-special-notes/en-special-series-
on-covid-19-digital-financial-services-and-the-
pandemic.ashx?la=en&utm_medium=email&utm_source=govdelivery
Ajagbe, S. A., Adeniji, O. D., Olayiwola, A. A., & Abiona, S. F. (2024). Advanced Encryption
Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using
Huffman Compression. SN Computer Science, 5(1), 156. https://doi.org/10.1007/s42979-
023-02486-6
Alenizi, A., Mohammadi, M. S., Al-Hajji, A. A., & Ansari, A. S. (2024). A Review of Image
Steganography Based on Multiple Hashing Algorithm. Computers, Materials & Continua,
80(2).
https://www.researchgate.net/profile/Arshiya-Ansari-
2/publication/382661222_A_Review_of_Image_Steganography_Based_on_Multiple_Ha
shing_Algorithm/links/66c0d7db145f4d355361f107/A-Review-of-Image-Steganography-
Based-on-Multiple-Hashing-Algorithm.pdf
Altigani, A., Hasan, S., Barry, B., Naserelden, S., Elsadig, M. A., & Elshoush, H. T. (2021). A
polymorphic advanced encryption standard–a novel approach. IEEE Access, 9, 20191–
https://ieeexplore.ieee.org/abstract/document/9321317/
Andersson,
M.
(2023).
Optimizing
the
computation
of
password
hashes.
https://helda.helsinki.fi/server/api/core/bitstreams/23a37f74-a162-4473-b894-
5da77f0627d1/content
Ashila, M. R., Atikah, N., Rachmawanto, E. H., & Sari, C. A. (2019). Hybrid AES-Huffman coding
for secure lossless transmission. 2019 Fourth International Conference on Informatics and
Computing (ICIC), 1–5. https://ieeexplore.ieee.org/abstract/document/8985899/
Erdal, E., & Ergüzen, A. (2019). An efficient encoding algorithm using local path on huffman
encoding
algorithm
for
compression.
Applied
Sciences,
9(4),
https://www.mdpi.com/2076-3417/9/4/782
Gajjala, R. R., Banchhor, S., Abdelmoniem, A. M., Dutta, A., Canini, M., & Kalnis, P. (2020).
Huffman Coding Based Encoding Techniques for Fast Distributed Deep Learning.
Proceedings of the 1st Workshop on Distributed Machine Learning, 21–27.
https://doi.org/10.1145/3426745.3431334
Grassi, L., Leander, G., Rechberger, C., Tezcan, C., & Wiemer, F. (2021). Weak-Key
Distinguishers for AES. In O. Dunkelman, M. J. Jacobson, & C. O’Flynn (Eds.), Selected
Areas in Cryptography (Vol. 12804, pp. 141–170). Springer International Publishing.
https://doi.org/10.1007/978-3-030-81652-0_6
Habib, A., Islam, M. J., & Rahman, M. S. (2020). A dictionary-based text compression technique
using quaternary code. Iran Journal of Computer Science, 3(3), 127–136.
https://doi.org/10.1007/s42044-019-00047-w
Haldar-Iversen, S. (2020). Improving the text compression ratio for ASCII text Using a
combination of dictionary coding, ASCII compression, and Huffman coding [Master’s
Thesis, UiT Norges arktiske universitet]. https://munin.uit.no/handle/10037/20517
Haryaman, A., Amrita, N. D. A., & Redjeki, F. (2024). SECURE AND INCLUSIVE
UTILIZATION
OF
SHARED
DATA
POTENTIAL
WITH
MULTI-KEY
HOMOMORPHIC ENCRYPTION IN BANKING INDUSTRY. Journal of Economics,
Accounting,
Business,
Management,
Engineering
and
Society,
1(9),
1–13.
http://kisainstitute.com/index.php/kisainstitute/article/view/36
Herzog, C., Tong, V. V. T., Wilke, P., van Straaten, A., & Lanet, J.-L. (2020). Evasive Windows
Malware: Impact on Antiviruses and Possible Countermeasures. Proceedings of the 17th
International Joint Conference on E-Business and Telecommunications, 302–309.
https://doi.org/10.5220/0009816703020309
Islam, M., Nurain, N., Kaykobad, M., Chellappan, S., & Islam, A. B. M. A. A. (2019). HEliOS:
Huffman coding based lightweight encryption scheme for data transmission. Proceedings
of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing,
Networking and Services, 70–79. https://doi.org/10.1145/3360774.3360829
Javaid, M., Haleem, A., Singh, R. P., Suman, R., & Khan, S. (2022). A review of Blockchain
Technology applications for financial services. BenchCouncil Transactions on
Benchmarks,
Standards
and
Evaluations,
2(3),
https://www.sciencedirect.com/science/article/pii/S2772485922000606
Kaffah, F. M., Gerhana, Y. A., Huda, I. M., Rahman, A., Manaf, K., & Subaeki, B. (2020). E-mail
message encryption using Advanced Encryption Standard (AES) and Huffman
compression engineering. 2020 6th International Conference on Wireless and Telematics
(ICWT), 1–6. https://ieeexplore.ieee.org/abstract/document/9243651/
Kaur, P., Kaur, R., Kaur, A., & Sharma, V. K. (2023). Privacy Preservation and Secured Data
Storage on Cloud Using Encryption Algorithms. 2023 International Conference on
Advances in Computation, Communication and Information Technology (ICAICCIT),
1374–1378. https://ieeexplore.ieee.org/abstract/document/10465702/
Kishor Kumar, R., Yogesh, M. H., Raghavendra Prasad, K., Sharankumar, & Sabareesh, S. (2024).
256-Bit AES Encryption Using SubBytes Blocks Optimisation. In V. K. Gunjan, A. Kumar,
J. M. Zurada, & S. N. Singh (Eds.), Computational Intelligence in Machine Learning (Vol.
1106, pp. 621–628). Springer Nature Singapore. https://doi.org/10.1007/978-981-99-7954-
7_56
Kumar, M. R. R., Josna, B. A., Lawvanyaa, R., & Shruthi, S. (2023). ADVANCED SECURITY
USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES.
https://www.academia.edu/download/104182962/IRJET_V10I603.pdf
Nidhi, M., & Kadam, S. A. (n.d.). A STUDY OF ACADEMIC INSTITUTION’S DIGITAL
CERTIFICATES PREFERENCES FOR WEBSITE SECURITY. Retrieved October 25,
2024,
from
https://www.researchgate.net/profile/Sachin-Kadam-
14/publication/362518466_A_STUDY_OF_ACADEMIC_INSTITUTION'S_DIGITAL_
CERTIFICATES_PREFERENCES_FOR_WEBSITE_SECURITY/links/634ea41112cbac
6a3ed72f91/A-STUDY-OF-ACADEMIC-INSTITUTIONS-DIGITAL-CERTIFICATES-
PREFERENCES-FOR-WEBSITE-SECURITY.pdf
Prasanna, R., Prathaban, B. P., Jenath, M., Rajendran, S., & Ashokkumar, M. (2024).
Computational framework for human detection through improved ultra-wide band radar
system. International Journal for Multiscale Computational Engineering, 22(1).
https://www.dl.begellhouse.com/journals/61fd1b191cf7e96f,6129d44f1682fc8e,1e068d4
e5c88fe0e.html
Rahman, Md. A., & Hamada, M. (2023). A prediction-based lossless image compression procedure
using dimension reduction and Huffman coding. Multimedia Tools and Applications, 82(3),
4081–4105. https://doi.org/10.1007/s11042-022-13283-3
Reza, M. S., Riya, S. A., Alam, S. A., & Hossain, M. A. A. (2019). Study on Text Compression
[PhD Thesis, United International University]. http://dspace.uiu.ac.bd/handle/52243/822
Rivera, C., Di, S., Tian, J., Yu, X., Tao, D., & Cappello, F. (2022). Optimizing huffman decoding
for error-bounded lossy compression on gpus. 2022 IEEE International Parallel and
Distributed
Processing
Symposium
(IPDPS),
717–727.
https://ieeexplore.ieee.org/abstract/document/9820677/
SANDHU,
S.
(2021).
LOSSLESS
DATA
COMPRESSION:
AN
OVERVIEW.
https://www.ubishops.ca/wp-content/uploads/sandhu20211029.pdf
Sari, C. A., Ardiansyah, G., & Rachmawanto, E. H. (2019). An improved security and message
capacity using AES and Huffman coding on image steganography. ?KOMNIKA
(Telecommunication
Computing
Electronics
and
Control),
17(5),
2400–2409.
http://telkomnika.uad.ac.id/index.php/TELKOMNIKA/article/view/9570
Sivanandam, L., Periyasamy, S., & Oorkavalan, U. M. (2020). Power transition


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo