Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Blockchain and Hybrid Encryption: A Dual Layer Approach to Secure Data Communication

    Abstract

    In today's digitally connected environment, ensuring the confidentiality, integrity, and authenticity of transmitted information is crucial. This research presents a dual-layer security architecture that integrates blockchain technology with a hybrid encryption approach to strengthen the protection of digital communications. The system utilizes ChaCha20- Poly1305, an authenticated encryption algorithm known for its speed and security, to encrypt data efficiently. Elliptic Curve Cryptography (ECC) is adopted for secure and lightweight key exchange. To verify message integrity and authenticity, the framework incorporates SHA-256 for generating cryptographic hashes and ECDSA for producing verifiable digital signatures. The blockchain component serves as a decentralized and tamper-resistant ledger that stores essential communication metadata, preventing unauthorized access or alteration. This combined methodology provides a scalable, robust, and efficient solution to modern cybersecurity concerns. Theoretical analysis and architectural design confirm the feasibility and effectiveness of employing blockchain alongside hybrid encryption for securing data transmission in real-world applications.

    Reviewer Photo

    Niravkumar K Patel Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Niravkumar K Patel Reviewer

    Hello Researcher,

    I hope you are doing well. Thanks for giving me the chance to review the research paper on blockchain and hybrid encryption. I like the research paper efficiently in the encryption dual-way authentication, and it will process very fast compared to other algorithms. The paper shows the depth process of the authentication and authorization technique, also correct, but I can see that the ChaCha20-Poly1305 algorithm has an issue with nonce management, with duplicate generation of the ID for authentication, and it can be a security concern because they can decrypt and use the same nonce with data manipulations.



    I suggest two ways to improve this implementation process.

    and it can have these problems.




    Never reuse a nonce with the same key. Period.

    Use authenticated encryption (like ChaCha20-Poly1305) to prevent tampering.

    Persist counters or track random nonces to prevent collisions.

    Encrypt with fresh keys frequently if you can’t trust your nonce logic.

    Use a well-tested crypto library



    I think if you can try to add and implement with correct nonce management techniques, such as



    1) 

    Advanced: Using libsodium (PyNaCl or native)

    Libsodium simplifies nonce management crypto_aead_chacha20poly1305_ietf, using best practices internally. For example:


    from nacl.secret import SecretBox
    from nacl.utils import random
    
    key1 = SecretBox.generate().encode()
    box1 = SecretBox(key1)
    nonce1 = random(24)  # For SecretBox only. For AEAD: use 12-byte.
    ciphertext = box1.encrypt(b"secret data", nonce)
    



    2) Use UUID generation plus Key Derivation for a unique nonce key


    from cryptography.hazmat.primitives.kdf.hkdf import HKDF

    from cryptography.hazmat.primitives.hashes import SHA256

    from cryptography.hazmat.primitives.ciphers.aead import ChaCha20Poly1305

    import uuid

    import os


    # Master key generation

    master_key = os.urandom(32) # 256-bit base key


    # Generate UUIDv4 key id

    message_uuid = uuid.uuid4().bytes # 16 bytes


    # Derive a unique key per message to process into systems

    hkdf = HKDF(

      algorithm=SHA256(),

      length=32,

      salt=None,

      info=b'per-message-key',

    )

    derived_key = hkdf.derive(master_key + message_uuid)


    # Use a constant nonce, since key is now unique

    nonce = b'\x00' * 12

    aead = ChaCha20Poly1305(derived_key)

    ciphertext = aead.encrypt(nonce, b"secret data", None)



    This will help to generate the duplicate ID, and it will prevent security issues because security is most important in the authentication process. I have used several authentication previously and show this kind of problem. I have overcome this process previously.



    Overall, the research paper is good. I like it.



    Thanks,

    Niravkumar Patel

    Reviewer Photo

    Niravkumar K Patel Reviewer

    23 Jun 2025 10:06 AM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    I want this paper to be published.

    Publisher Logo

    IJ Publication Publisher

    Dear Sir,

    Thank you for your prompt response. We have noted your comments and shared them with the author for further action.

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Niravkumar K

    Niravkumar K Patel

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JNRID - JOURNAL OF NOVEL RESEARCH AND INNOVATIVE DEVELOPMENT External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2984-8687

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp