Comparison of string encryption performance using symmetric methods in Android

  1. In order for hackers not to obtain them using password stuffing or brute-forcing, keys should be complicated and well-protected. To distribute keys and store keys and keep them out of the wrong hands, you should consider a secure process. Keys should not be transmitted over the network in plain text or stored as a string in the app.
  2. Instead of using a string as a passphrase, use a value that is unique to the local device, so that hackers would not detect that particular values as a passphrase.
  3. Better yet, use the local static value, apply some other encoding or encryption method and then use that converted string as a passphrase for the actual encryption
  4. Store the passphrase in keystore




Lead Android Developer, Flutter Lover

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to use Google API Gateway with Cloud Run

Linked Lists — An introduction

Medium Post on Agile- upGrad Assignment

How to get started in Web Development: “The Right Way”

Go isn’t all that fancy, and that’s probably what your team needs

My journey towards becoming GitHub campus expert

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Nabil Mosharraf Hossain

Nabil Mosharraf Hossain

Lead Android Developer, Flutter Lover

More from Medium

Peer in OkHttp(1)

Coroutine Adventure Part.3

Build your own event bus with Rx

Quick Note: Custom WebView Class Won’t Display Virtual Keyboard After Kotlinized