There is no wealth like Knowledge
                            No Poverty like Ignorance
ARPN Journals

ARPN Journal of Engineering and Applied Sciences >> Call for Papers

ARPN Journal of Engineering and Applied Sciences

Evaluating the multi-purpose encryption (MPE) algorithm: Efficiency, security, and adaptability for multilingual text encryption in real-time applications

Full Text Pdf Pdf
Author Saleem S. Sharqy, Bi-Lynn Ong and Naimah Yaakob
e-ISSN 1819-6608
On Pages 674-687
Volume No. 20
Issue No. 11
Issue Date August 31, 2025
DOI https://doi.org/10.59018/062583
Keywords text data characters, MPE algorithm, encryption, small and capital letters in english.


Abstract

This paper evaluates the Multi-Purpose Encryption (MPE) Algorithm for its efficiency, security, and adaptability in encrypting and decrypting diverse text-based data, particularly in real-time applications. The algorithm is tested across multiple character sets, including uppercase and lowercase English letters, Arabic text, and special characters. It demonstrates its capability to transform plaintext into ciphertext while maintaining minimal computational overhead securely. Performance analysis reveals that encryption is executed within microseconds for short texts, whereas decryption requires slightly longer processing time due to the complexity of reversing the transformation. The algorithm exhibits scalability, efficiently handling large inputs, making it suitable for multilingual text security applications such as cloud- based systems and Software-Defined Networking (SDN). Additionally, the MPE Algorithm strengthens security by integrating non-standard character transformations, enhancing resistance against cryptographic attacks. Results indicate that encryption and decryption times scale proportionally with input size, confirming the algorithm’s computational efficiency and real-time applicability. This research highlights the MPE Algorithm as a promising solution for secure communication and data protection, particularly in modern digital security frameworks. Future work should focus on optimizing the algorithm through hardware acceleration, refining transformation techniques, and benchmarking against standardized cryptographic methods to further enhance its performance and applicability in dynamic networking environments.

Back

GoogleCustom Search



Seperator
    arpnjournals.com Publishing Policy Review Process Code of Ethics

Copyrights
© 2025 ARPN Publishers