Comparison of string encryption performance using symmetric methods in Android

  1. In order for hackers not to obtain them using password stuffing or brute-forcing, keys should be complicated and well-protected. To distribute keys and store keys and keep them out of the wrong hands, you should consider a secure process. Keys should not be transmitted over the network in plain text or stored as a string in the app.
  2. Instead of using a string as a passphrase, use a value that is unique to the local device, so that hackers would not detect that particular values as a passphrase.
  3. Better yet, use the local static value, apply some other encoding or encryption method and then use that converted string as a passphrase for the actual encryption
  4. Store the passphrase in keystore




Lead Android Developer, Flutter Lover

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Openproject with Docker on Synology NAS

Feature Toggles for Spring Boot applications with IBM Cloud App Configuration

Virtual Clusters for Kubernetes — Benefits and Use Cases

Python Programming Language: Summary01(Introduction)

SQL: The Practical Guide — Text data type ( part 5.2 )

This is appropriate, because too much fluid in the body can cause the lungs

Build Your Own Stock Market Data ETL Pipeline on AWS RDS

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Nabil Mosharraf Hossain

Nabil Mosharraf Hossain

Lead Android Developer, Flutter Lover

More from Medium

Explore on Guard Clause

Advent of Code 2021 in Kotlin

Android WebView The Missing guide

Dagger 2 Dependency Injection Part 1