<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Derkach);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>CrypticWave: A zero-persistence ephemeral messaging system with client-side encryption⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maryna Derkach</string-name>
          <email>m_derkach@tntu.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Danylo Matiuk</string-name>
          <email>matiuk.danylo@icloud.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Skarga-Bandurova</string-name>
          <email>iskarga-bandurova@brookes.ac.uk</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliya Zagorodna</string-name>
          <email>zagorodna_n@tntu.edu.u</email>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>1808</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>This paper presents CrypticWave, a secure ephemeral messaging system that implements client-side authenticated encryption (AES-GCM), one-time message access, and volatile in-memory message storage. The encryption model ensures a high level of protection against tampering, as GCM provides built-in integrity verification. The system is deployed in a cloud environment using Docker containers, with a PostgreSQL database mounted on a RAM-based file system ensuring that all data is re-initialized after each restart, thereby enhancing user data protection and eliminating persistent traces. CrypticWave was tested under a threat model involving active adversaries with server access. Results show that proposed architecture significantly reduces metadata leakage and prevents message recovery after first access. System performance and usability were also evaluated through benchmarking and user testing. The findings support CrypticWave as a lightweight, privacy-preserving messaging solution suitable for sensitive information exchange in high-risk or surveillance-prone environments. The service is available at: https://www.crypticwave.tech/.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;zero-persistence</kwd>
        <kwd>ephemeral messaging</kwd>
        <kwd>client-side authenticated encryption</kwd>
        <kwd>one-time message</kwd>
        <kwd>inmemory storage</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Information technologies have significantly facilitated remote communication and data exchange,
enhancing convenience and operational efficiency across numerous domains. However, the rapid
increase in the transmission of confidential data through electronic channels poses substantial
security challenges. This concern becomes particularly pronounced when dealing with sensitive
data such as passwords, API keys, access tokens, banking details (account numbers, card numbers,
IBAN, SWIFT), and confidential documents within finance, critical infrastructure, IoT, law,
journalism,
education,
research,
and
personal
communications
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Traditional
digital
communication tools, including email, messaging applications, and cloud storage, often fail to
consistently meet the required security standards [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2–4</xref>
        ]. These methods usually store messages and
data on centralised servers, increasing the likelihood of data breaches in the event of unauthorised
access or cyberattacks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Recent forensic research underscores this vulnerability, highlighting that
even encrypted messaging platforms like WhatsApp, Signal, Telegram, Wickr, and Threema leave
behind recoverable artefacts in memory. Such data remnants, including usernames, metadata, and
occasionally message content, can be recovered through memory forensic techniques, particularly
on desktop or web-based versions of these applications [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. One way to address these vulnerabilities
involves the use of one-time messaging services that automatically delete messages after viewing.
Tools such as Privnote [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], OneTimeSecret [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and One Time Chat [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] provide temporary,
encrypted links or messages that self-destruct after initial access, thereby reducing the risk of
unauthorised retrieval. Another notable tool, OnionShare, leverages onion routing technology
through the Tor network to ensure anonymous and secure file and message transfers [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. These
solutions have demonstrated effectiveness in protecting data within financial [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and healthcare
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] sectors, as well as other sensitive areas. However, despite the existing advantages, most current
solutions still have significant vulnerabilities. Most current one-time messaging solutions still
temporarily store sensitive plaintext or encryption keys within server memory, which can be
recovered using memory forensic methods. Even after viewing a message, traces of information or
its metadata can remain in RAM, creating potential attack vectors, in particular through memory
dumps, as confirmed by numerous studies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Thus, an important question remains unresolved:
how to create a service that not only instantly destroys messages after viewing, but also
fundamentally prevents any traces of sensitive data from being left in the server memory,
eliminating the risks of digital forensics and memory leaks? To address this query, this paper
presents a basic architecture of the CrypticWave service for secure one-time encrypted messaging.
CrypticWave implements the security by design principle, characterised by minimal data retention,
absence of logging, and volatile storage using tmpfs. Crucially, our server architecture never stores
encryption keys, but only encrypted data with the PostgreSQL database fully operating in RAM,
thereby substantially mitigating forensic risks. Research in the field of optimizing cryptographic
primitives, particularly in finding efficient bitsliced descriptions of S-boxes, demonstrates the
potential to enhance performance and reduce resource consumption in client-side encryption [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Furthermore, the application of entropy-based methods for evaluating the strength of encryption
algorithms enables a quantitative assessment of protection levels, which is especially critical for
one-time messaging services [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Specifically, this paper makes the following contributions: (1)
Design of a stateless, zero-persistence messaging system that ensures confidentiality using
AESGCM encryption performed entirely on the client side; (2) Implementation of volatile message
storage utilising tmpfs and containerization to minimise potential memory leaks; (3) Evaluation of
system performance and user trust through benchmarking and usability studies.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>As discussed above, current ephemeral messaging services often retain vulnerabilities due to
temporary storage of encryption keys, server logs, or persistent databases structures. To address
these challenges, CrypticWave implements a zero-persistence architecture characterized by: (1)
Client-side AES-GCM encryption with enforced single-use message access; (2) Volatile message
storage utilizing tmpfs combined with Docker containerization to ensure RAM-only data handling;
(3) Immediate and automatic data deletion after first access, with no key information retained on
the server; and (4) Absence of user registration or identity tracking, thereby eliminating any
possibility of linking user activities.</p>
      <sec id="sec-2-1">
        <title>2.1. Encryption model</title>
        <p>
          Data encryption ensures that transmitted messages are rendered unreadable without a
corresponding decryption key, thereby safeguarding information from malicious interception [
          <xref ref-type="bibr" rid="ref15 ref16">15,
16</xref>
          ]. The CrypticWave employs the Advanced Encryption Standard in Galois/Counter Mode
(AESGCM), an authenticated encryption mechanism recognized for its robust security guarantees and
high efficiency (Table 1). AES-GCM provides simultaneous encryption and integrity verification
through two main cryptographic operations, AES in Counter Mode (CTR) for encryption and
GHASH Polynomial Authentication for verifying data integrity [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <sec id="sec-2-1-1">
          <title>Purpose</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Encryption key (128, 192 or 256 bits)</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Unique initialization vector (96-bits)</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>Additional Authenticated Data (e.g., headers)</title>
        </sec>
        <sec id="sec-2-1-5">
          <title>Unencrypted original message</title>
        </sec>
        <sec id="sec-2-1-6">
          <title>Encrypted message content</title>
          <p>Each plaintext block Xi undergoes XOR operations with CTR-generated encryption output,
followed by multiplication by the hash key H. The result of the last iteration is used as the hash
value GHASH.</p>
          <p>Authenticated data (AAD) and ciphertext are individually padded to 128-bit multiples and
combined into a single message Si:</p>
          <p>Authentication Tag (Tag)</p>
          <p>128-bit hash ensuring data integrity and authenticity</p>
          <p>AES-GCM operation begins by generating a 256-bit encryption key (K) and a 96-bit unique
initialization vector (IV). Using these parameters, AES encryption in CTR mode encrypts the
plaintext. Simultaneously, the GHASH function computes a polynomial-based authentication tag to
check whether the data has been modified during transmission. This is done using the special
GHASH hash function, which performs mathematical operations on the Galois field GF(2¹²⁸):
where H = Ek(0128) denotes the hash key derived from encrypting 128 zero-bits using key; m,
n represent the count of 128-bit blocks in AAD and Ciphertext, respectively, and Xi is computed as:</p>
          <p>GHASH ( H , AAD , Ciphertext )= X m+n+1 ,
X i = ∑ S j ∙ H i− j +1= {
i
j =1</p>
          <p>0 , for i =0 ,
( X i−1 S i ) ∙ H , for i =1 , … , m +n +1 ,</p>
          <p>AAD i , for i =1 , … , m −1 ,</p>
          <p>AAD m* || 0128−v , for i =m ,
Ciphertext i−m , for i =m +1 , … , m +n −1 ,</p>
          <p>Ciphertext n* || 0128−u , for i =m +n ,
len ( AAD ) || len ( Ciphertext ) , for i =m +n +1 ,
where len(AAD), len(Ciphertext) are 64-bit lengths of AAD and Ciphertext, respectively, v and u
represent lengths of the final blocks of AAD and Ciphertext, respectively, || denotes the union of bit
strings. Upon reception, the recipient, possessing the key K, decrypts the ciphertext and
independently recalculates the authentication tag. If any data tampering occurs, even a single-bit
change, the authentication verification fails, thus preventing unauthorized data modifications. This
AES-GCM encryption model adopted by CrypticWave robustly secures data against interception,
server-side vulnerabilities, and unauthorized alterations, providing strong cryptographic
assurances of confidentiality and integrity.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. System architecture</title>
        <p>The CrypticWave architecture offers improvements over existing ephemeral messaging tools due
to (1) fully client-side encryption, ensuring plaintext never reaches the server, (2) non-transmission
(1)
(2)
(3)
and non-storage of encryption keys on the server, (3) exclusive server-side storage of encrypted
content without the ability to decrypt, (4) immediate and irreversible message deletion following a
single access, (5) scalability and ease of deployment through Docker containerization, and (6)
automated provisioning and management of SSL, databases, and web infrastructure. Figure 1
illustrates the system architecture, depicting the communication and data flow between
components.
2.2.1. Operational workflow
The User1 (Sender) interacts with CrypticWave via a cross-platform front-end, inputting the
message content. For each message, a unique message ID and AES encryption key are generated on
the client-side. The message undergoes client-side AES-GCM encryption, producing encrypted data
and an authentication tag. The encrypted message and tag are transmitted securely via the Web
Crypto API to the server, generating a unique one-time-access link. User2 (Recipient) decrypts the
message using the key embedded in the unique link. The client-side decryption restores plaintext
and verifies the integrity via authentication tag. Immediately after successful access, the message is
deleted from volatile RAM storage, ensuring zero recoverability.
2.2.2. Encryption and client-side logic
All encryption and decryption of messages happen directly on the user’s device. This means that
the server never sees the original message or the encryption key. When User1 creates a message, it
is encrypted using a secure algorithm (AES-GCM) in the browser. After the message is encrypted,
the system generates a unique link (ID) that includes the necessary information to access the
message. This link is sent to User2, who can then open it and decrypt the message on their own
device.
2.2.3. Network layer
CrypticWave integrates Cloudflare as a secure intermediary between users and the backend
infrastructure, serving as both a reverse proxy and a comprehensive security layer. When users
access the CrypticWave domain, their requests are first routed through Cloudflare’s global edge
network. This setup allows Cloudflare to handle DNS resolution and forward traffic to the
appropriate backend services while hiding the true IP address of the host server. Cloudflare also
manages SSL/TLS encryption by terminating HTTPS connections at the edge, reducing
cryptographic load on the original server. To further protect the system, Cloudflare applies to a
web application firewall (WAF), which detects and blocks malicious traffic. In the case of
CrypticWave, the WAF is configured to filter out requests that contain SQL injection, cross-site
scripting (XSS), or other common attack payloads. It also defends against brute-force attempts to
guess valid message links by rate-limiting access to sensitive endpoints. Dynamic API endpoints
used to transmit and receive encrypted messages are excluded from caching to maintain message
integrity and the one-time access guarantee. Access to the backend server is restricted to
Cloudflare’s infrastructure, preventing direct connections from the open internet. This security
design reduces the attack surface and ensures that only filtered and validated traffic reaches the
CrypticWave host environment.
2.2.4. Host server
The main backend of the system runs on a physical or virtual server. The different parts of the
application are packaged in Docker containers, which are used to isolate individual components of
the CrypticWave system ensuring consistent execution environments across different deployment
platforms. Containerization also enhances fault isolation, enables microservice scaling, and
simplifies orchestration through Docker Compose. The host server runs Nginx frontend only sends
static files (like the webpage) to the user’s browser; Nginx backend handles incoming and outgoing
requests, acting as a bridge between the frontend and the database; PostgreSQL (in tmpfs) is a
database, but it is stored only in the server’s RAM (temporary memory). Nothing is saved on the
hard disk, so once the server restarts or data is accessed and deleted, there’s no way to recover it.
2.2.5. Technology stack and design considerations
The PostgreSQL database is deployed entirely in-memory using an RAM-based filesystem (tmpfs).
This ensures that all encrypted messages reside only in volatile memory and are irretrievably lost
upon access, server reboot, or container restart. This approach eliminates the risk of residual data
being recovered through forensic analysis. While it limits the system’s capacity to the available
RAM and forfeits persistence across reboots, these are acceptable trade-offs in a design where
message permanence is intentionally avoided. The full application stack is containerized using
Docker and orchestrated with Docker Compose, enabling isolated, repeatable deployments across
cloud infrastructure hosted on Proxmox. This architecture supports CrypticWave’s core objectives:
secure message lifecycle control, minimal metadata exposure, and efficient, stateless deployment.
While its functionality overlaps with some Docker-native features, PM2 adds another layer of
resilience and observability during development and staging without introducing significant
complexity.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>
        The CrypticWave service was evaluated across three key dimensions: (i) security against
postcompromise threats, (ii) system performance under realistic load, and (iii) usability and user trust.
Where possible, we compare CrypticWave with two widely used ephemeral messaging tools:
Privnote and OneTimeSecret. To the best of our knowledge, no prior academic work has published
memory-dump analyses of ephemeral messaging systems such as Privnote or OneTimeSecret. At
the same time, extensive memory-forensics research confirms that sensitive plaintext or encryption
artifacts frequently remain in RAM post-deletion [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ]. Therefore, at this stage, we relied on data
from literature and assumed that competing messaging tools may leave retrievable ciphertext,
identifiers (IDs), or metadata (IP logs) in memory that could be recovered via forensic tools in
postcompromise scenarios. For CrypticWave, we simulated a full server-compromise scenario where an
attacker gains unrestricted access to the host system after a message is submitted but before it is
accessed. The message payloads included synthetic sensitive data (e.g., API keys, passwords,
session tokens). Using standard forensic tools such as volatility, strings, grep, and lsof, we
conducted memory and disk inspections. No retrievable plaintext or associated metadata (e.g.,
sender IPs, message IDs, encryption keys) were found after tmpfs reset and process cleanup. Logs
were also non-persistent and cleared upon restart, confirming CrypticWave’s effective
implementation of zero-persistence principles.
      </p>
      <p>To evaluate system performance, we deployed CrypticWave in a controlled environment on a
Proxmox virtual container with 2 vCPUs and 4 GB RAM. Stress tests were performed using work
and custom Python clients simulating concurrent user behaviour under various load conditions (10,
50, and 100 concurrent users). Under varying load conditions, CrypticWave remained highly
responsive. Cold response times, which include initial Docker container start-up, averaged 145
milliseconds, while warm response times stabilized around 48 milliseconds after boot. The system
sustained a maximum throughput of approximately 620 messages per minute with 100 concurrent
users, without degradation in performance. Steady-state memory usage remained around 208 MB,
which includes the front-end, back-end, and the PostgreSQL database running entirely in RAM via
tmpfs. This in-memory design significantly accelerated message access and deletion operations by
eliminating disk I/O, and CPU usage did not exceed 11% even under peak load, confirming the
system’s suitability for lightweight, ephemeral messaging in real-time environments.</p>
      <p>A usability study was conducted with 24 participants (12 technical and 12 non-technical users),
split between an A/B comparison of CrypticWave vs. Privnote. Each participant completed a set of
guided tasks (send, view, and delete a message), followed by a post-test survey. Table 3 presents
comparison of usability metrics gathered from CrypticWave and Privnote.</p>
      <p>Participants particularly appreciated the one-time access feature, lack of registration, and clarity
of encryption messages on the UI. However, a few users initially struggled to understand that the
system does not retain messages at all, a usability challenge also noted in open-ended feedback.
This study presents CrypticWave, a stateless, zero-persistence encrypted messaging service
designed around the principle of security by design. Through controlled experiments, we
demonstrated that CrypticWave effectively prevents post-compromise data recovery, maintains
stable performance under realistic user loads, and delivers a positive user experience with high
perceived trustworthiness. These results validate the system’s core architectural choices,
particularly full client-side AES-GCM encryption, RAM-only storage using tmpfs, and the absence
of user tracking or persistent logs. However, while CrypticWave eliminates several critical
vulnerabilities found in traditional ephemeral messaging tools, some residual risks remain inherent
to its architecture and operational environment. To further strengthen the security guarantees of
CrypticWave, we plan to conduct controlled forensic analyses of self-hosted replicas of Privnote
and OneTimeSecret and compare residual artefacts, metadata retention, and RAM persistence
behaviour across platforms. Future iterations of CrypticWave will explore deploying a
decentralized proxy network to reduce dependence on third-party infrastructure. We also plan to
extend the bearer-link mechanism with optional multi-factor access, ephemeral DNS entries, and
client-side passphrase layers to reduce the risk of token interception. A formal threat model and
penetration testing campaign will be developed to evaluate CrypticWave against known attack
vectors. Through these developments, we aim to establish CrypticWave not only as a practical tool
for secure ephemeral messaging, but also as a reference model for zero-trust, zero-persistence
communication architectures.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <p>Portions of this manuscript were prepared with the assistance of AI-based language tools,
including OpenAI’s ChatGPT and Grammarly, for tasks such as editing, grammar correction, and
improving technical writing. All scientific content, architectural design, experimental methodology,
and analysis were implemented, and validated by the authors. The AI was not used to generate
data, conduct experiments, or formulate original research ideas. The authors used also Strike
Plagiarism to search for possible plagiarism.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mishko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Matiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Derkach</surname>
          </string-name>
          ,
          <article-title>Security of Remote IoT System Management by Integrating Firewall Configuration into Tunneled Traffic</article-title>
          ,
          <string-name>
            <surname>Sci. J. TNTU</surname>
          </string-name>
          ,
          <volume>115</volume>
          (
          <issue>3</issue>
          ) (
          <year>2024</year>
          )
          <fpage>122</fpage>
          -
          <lpage>129</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Chernenko</surname>
          </string-name>
          , et al.,
          <article-title>Encryption Method for Systems with Limited Computing Resources</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>142</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Petriv</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
           Opirskyy,
          <string-name>
            <given-names>N.</given-names>
             
            <surname>Mazur</surname>
          </string-name>
          , Modern Technologies of Decentralized Databases, Authentication, and
          <article-title>Authorization Methods, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>60</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shcheblanin</surname>
          </string-name>
          , et al.,
          <source>Research of Authentication Methods in Mobile Applications, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          Vol.
          <volume>3421</volume>
          . (
          <year>2023</year>
          )
          <fpage>266</fpage>
          -
          <lpage>271</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Tymoshchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yasniy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mytnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zagorodna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tymoshchuk</surname>
          </string-name>
          ,
          <article-title>Detection and Classification of DDoS Flooding Attacks by Machine Learning Method</article-title>
          , arXiv,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2412.18990
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Onik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brown</surname>
          </string-name>
          , C. Walker,
          <string-name>
            <surname>I. Baggili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Systematic</given-names>
            <surname>Literature</surname>
          </string-name>
          <article-title>Review of Secure Instant Messaging Applications from a Digital Forensics Perspective</article-title>
          , ACM Comput. Surv.,
          <volume>57</volume>
          (
          <issue>9</issue>
          ) (
          <year>2025</year>
          ).
          <source>doi:10.1145/3727641</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ermoshina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Musiani</surname>
          </string-name>
          , Hiding from Whom?
          <article-title>Threat Models and in-the-</article-title>
          <string-name>
            <surname>Making Encryption</surname>
            <given-names>Technologies</given-names>
          </string-name>
          , Intermédialités / Intermediality,
          <volume>32</volume>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .7202/1058473ar
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] onetimesecret, GitHub-onetimesecret/onetimesecret: Keep Passwords and Other Sensitive Information out of Your Inboxes and Chat Logs (</article-title>
          <year>2025</year>
          ). https://github.com/onetimesecret/ onetimesecret
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kaczyński</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Glet</surname>
          </string-name>
          ,
          <article-title>One Time Chat-A Toy End-to-End Encrypted Web Messaging Service</article-title>
          , in: Applied Cryptography and
          <article-title>Network Security Workshops</article-title>
          ,
          <source>ACNS 2024, Lecture Notes in Computer Science</source>
          , vol.
          <volume>14587</volume>
          , Springer, Cham,
          <year>2024</year>
          ,
          <fpage>136</fpage>
          -
          <lpage>151</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -61489- 7_
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Choudhary</surname>
          </string-name>
          ,
          <article-title>The Onion Routing-The Good and the Bad, Symbiosis Institute of Computer Studies &amp; Research (</article-title>
          <year>2018</year>
          ).
          <source>doi:10.13140/RG.2.2.10181.09448</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Filchev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dovramadjiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dimova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Parushev</surname>
          </string-name>
          ,
          <article-title>Protection and Transfer of Financial Digital Data through Open Source Software</article-title>
          ,
          <source>in: Intelligent Human Systems Integration (IHSI</source>
          <year>2023</year>
          )
          <article-title>: Integrating People and Intelligent Systems</article-title>
          , AHFE Open Access,
          <volume>69</volume>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .54941/ahfe1002845
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Lou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lew</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Baratta</surname>
          </string-name>
          , E. Eiden, T. Kannampallil, Secure Messaging Use and
          <article-title>Wrong-Patient Ordering Errors among Inpatient Clinicians, JAMA Netw</article-title>
          . Open,
          <volume>7</volume>
          (
          <issue>12</issue>
          ) (
          <year>2024</year>
          )
          <article-title>e2447797</article-title>
          . doi:
          <volume>10</volume>
          .1001/jamanetworkopen.
          <year>2024</year>
          .47797
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sovyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhailova</surname>
          </string-name>
          ,
          <article-title>Heuristic Method of Finding Bitsliced-Description of Derivative Cryptographic S-Box</article-title>
          ,
          <source>in: Proc. 2022 IEEE 16th Int. Conf. on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET),
          <year>2022</year>
          ,
          <fpage>104</fpage>
          -
          <lpage>109</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET55632.
          <year>2022</year>
          .9766883
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Milevskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Melnyk</surname>
          </string-name>
          , I. Opirskyy,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stakhiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Stakhiv</surname>
          </string-name>
          ,
          <article-title>Entropy Method for Assessing the Strength of Encryption Algorithms</article-title>
          ,
          <source>in: Proc. 6th Int. Congr. on HumanComputer Interaction</source>
          ,
          <article-title>Optimization and Robotic Applications (HORA-</article-title>
          <year>2024</year>
          ),
          <year>2024</year>
          ,
          <fpage>200165</fpage>
          -1- 200165-9.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Derkach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mishko</surname>
          </string-name>
          ,
          <string-name>
            <surname>Using</surname>
            <given-names>AES</given-names>
          </string-name>
          -256
          <string-name>
            <surname>-CBC Encryption</surname>
          </string-name>
          Algorithm to Store Autonomous Assistant Authentication Data, Scientific News of Dahl University, Electronic ed.,
          <volume>24</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Chandravanshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Das</surname>
          </string-name>
          ,
          <article-title>A Secured Framework for Encrypted Messaging Service for Smart Device (Crypto-Message)</article-title>
          ,
          <source>in: Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>672</volume>
          ,
          <year>2018</year>
          ,
          <fpage>415</fpage>
          -
          <lpage>424</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-10-7512-4_
          <fpage>41</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gueron</surname>
          </string-name>
          ,
          <article-title>A New Interpretation for the GHASH Authenticator of AES-GCM, in: Cyber Security, Cryptology, and Machine Learning</article-title>
          ,
          <source>CSCML 2023, Lecture Notes in Computer Science</source>
          ,
          <volume>13914</volume>
          ,
          <year>2023</year>
          ,
          <fpage>457</fpage>
          -
          <lpage>471</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -34671-2_
          <fpage>30</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Maartmann-Moe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Thorkildsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Årnes</surname>
          </string-name>
          ,
          <article-title>The Persistence of Memory: Forensic Identification and Extraction of Cryptographic Keys</article-title>
          ,
          <source>Digital Investigation</source>
          ,
          <volume>6</volume>
          (
          <year>2009</year>
          )
          <fpage>132</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Davies</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Macfarlane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Buchanan</surname>
          </string-name>
          ,
          <article-title>Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation</article-title>
          , Forensic Science International: Digital Investigation,
          <volume>33</volume>
          (
          <year>2020</year>
          )
          <article-title>300979</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.fsidi.
          <year>2020</year>
          .300979
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>