SmartNotes Encrypted with Hybrid Cryptography Combining Rivest Cipher 4 and XChaCha20
Main Article Content
Abstract
Digital note-taking applications serve as essential tools for personal information management, presenting opportunities for enhanced security mechanisms to protect sensitive data. Most current solutions depend on server-side processing, creating potential vulnerabilities and privacy concerns. However, a robust solution that fully executes hybrid encryption on the client-side to seamlessly protect both text and image data within a single application remains unexplored. This study introduces SmartNotes, a web-based application safeguarding text and image notes through an innovative hybrid encryption system synergistically combining RC4 and XChaCha20 algorithms. A key contribution is the full client-side execution of encryption–decryption processes, eliminating server dependencies and significantly reinforcing data confidentiality. The hybrid design strategically utilizes RC4 for rapid data processing and XChaCha20 for robust cryptographic protection, creating an optimal balance between performance and security. System performance was rigorously evaluated using seven private datasets under diverse key conditions. Testing methodology included comprehensive assessment of processing speed, data integrity verification, and resistance against unauthorized access attempts. Results demonstrated flawless data restoration across all test cases, validating robustness and reliability. Encryption averaged 1.5 seconds, while decryption required 20.20 seconds metrics well-suited for practical web environments. These findings affirm SmartNotes delivers a secure, autonomous, user-centric solution for digital note management, advancing applied cryptography through a novel client-side hybrid encryption paradigm. This approach successfully balances strong security with practical performance, making it suitable for securing data in everyday web applications.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
D. A. Titania, L. Kurniawati, and T. Haryanti, “Perancangan Desain UI/UX Sistem Informasi Pengarsipan Surat Menggunakan Metode User Centered Design,” Metik Jurnal, vol. 8, no. 1, pp. 1–9, 2024, doi: 10.47002/METIK.V8I1.686.
S. Sujarwo, “Key analysis of the hill cipher algorithm (Study of literature),” Jurnal Mandiri IT, vol. 12, no. 3, pp. 135–141, 2024, doi: 10.35335/MANDIRI.V12I3.250.
I. Komang et al., “Analisis Komparatif Efektivitas Client-Side Encryption Cryptomator dan Rclone Crypt pada Google Drive,” Informatik : Jurnal Ilmu Komputer, vol. 21, no. 2, pp. 166–176, 2025, doi: 10.52958/IFTK.V21I2.11801.
A. A. Iswandi, H. Ngemba, S. Hendra, S. Syahrullah, and M. Noval Daffa Ulhaq, “Implementasi Algoritma RC4 Pada Sistem Informasi Pelaporan DUKCAPIL Provinsi Sulawesi Tengah : Implementation of the RC4 Algorithm in the DUKCAPIL Reporting Information System of Central Sulawesi Province,” Technomedia Journal, vol. 9, no. 2 Oktober, pp. 169–183, 2024, doi: 10.33050/TMJ.V9I2.2233.
F. Rahim, Y. R. Nasution, and Supiyandi, “Implementasi Algoritma ChaCha20 Pada Pengamanan File Citra Bitmap,” JURNAL FASILKOM, vol. 14, no. 3, pp. 615–626, 2024, doi: 10.37859/JF.V14I3.7956.
W. A. Karunia, A. F. Zahra, and Y. Amrozi, “Evaluasi Ancaman Baru Dalam Keamanan Informasi: Systematic Literature Review Tentang Kerentanan Cyber Security Pasca-Pandemi : Evaluating Emerging Threats In Information Security: A Systematic Literature Review On Post-Pandemic Cybersecurity Vulnerabiliti,” Cyber Security dan Forensik Digital, vol. 8, no. 1, pp. 10–16, 2025, doi: 10.14421/csecurity.2025.8.1.4889.
R. K. Abdullah, N. F. Azhar, S. Mujahidin, and R. O. Hoan, “Implementing AES-RSA Hybrid Encryption to Enhance the Security of Salary Slip Distribution Information System,” Jambura J. Electr. Electron. Eng., vol. 7, no. 1, pp. 33–40, 2025, doi: 10.37905/jjeee.v7i1.28737.
W. B. Nugroho, A. Susanto, C. A. Sari, E. H. Rachmawanto, and M. Doheir, “A ROBUST AND IMPERCEPTIBLE FOR DIGITAL IMAGE ENCRYPTION USING CHACHA20,” Jurnal Teknik Informatika (Jutif), vol. 5, no. 2, pp. 397–404, 2024, doi: 10.52436/1.JUTIF.2024.5.2.1470.
A. R. Nurjaman and S. Umaroh, “Peningkatan Keamanan Basis Data menggunakan Kombinasi Algoritma RC4 dan SHA3-512,” Rekayasa Hijau : Jurnal Teknologi Ramah Lingkungan, vol. 8, no. 2, pp. 162–171, 2024, doi: 10.26760/JRH.V8I2.162-171.
P. S. Ramadhan et al., “Transaction Data Security Using AES and RC4,” CESS (Journal of Computer Engineering, System and Science), vol. 8, no. 1, pp. 60–70, 2023, doi: 10.24114/CESS.V8I1.41212.
W. Almuseelem, “Enhance the Security of Data Based on Server-Side Encryption in a Cloud Environment,” International Journal of Online and Biomedical Engineering (iJOE), vol. 21, no. 08, pp. 75–103, 2025, doi: 10.3991/IJOE.V21I08.55031.
S. Raza et al., “A comprehensive review of recommender systems: Transitioning from theory to practice,” Computer Science Review, vol. 59, p. 100849, 2026, doi: 10.1016/J.COSREV.2025.100849.
S. E. Prasetyo, G. Wijaya, and A. Info, “Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption,” Jurnal E-Komtek, vol. 9, no. 1, pp. 340–350, 2025, doi: 10.37339/E-KOMTEK.V9I1.2259.
A. Musthofa, D. Rosal, and I. M. Setiadi, “Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security,” Journal of Applied Informatics and Computing, vol. 9, no. 4, pp. 1280–1289, 2025, doi: 10.30871/JAIC.V9I4.9569.
M. Solikhin, I. M. Sulandra, I. P. Tambun, A. M. Anwar, I. Hasanah, and N. A. Rizki, “Optimizing Elliptic Curve Cryptography Through Double Encryption and the Double-and-Add Method,” CGANT Journal of Mathematics and Applications, vol. 6, no. 1, pp. 31–38, 2025, doi: 10.19184/CGANTJMA.V2025I0.193.
I. M. Ihsan, A. Fauzi, and H. Khair, “Application of Cryptography and Steganography Techniques to Improving the Security of Text Messages with RC4 Algorithm and MSB Method,” Journal of Artificial Intelligence and Engineering Applications (JAIEA), vol. 4, no. 1, pp. 544–549, 2024, doi: 10.59934/JAIEA.V4I1.660.
S. Amini, M. Hardjianto, and D. Kusumaningsih, “Perbandingan Penggunaan Bit Steganografi Metode Least Significant Bit (LSB) M-Bit Pada Citra Digital,” Jurnal Ticom: Technology of Information and Communication, vol. 13, no. 3, pp. 129–134, 2025, doi: 10.70309/TICOM.V13I3.157.
E. H. Rachmawanto et al., “Crypto-Stegano Color Image Based on Rivest Cipher 4 (RC4) and Least Significant Bit (LSB),” (JAIS) Journal of Applied Intelligent System, vol. 8, no. 2, pp. 216–226, 2023, doi: 10.33633/JAIS.V8I2.8497.
B. Olivia Putri Irine Irawan et al., “Implementasi Kriptografi Pada Keamanan Data Menggunakan Algoritma Advance Encryption Standard (AES),” Jurnal Simantec, vol. 11, no. 2, pp. 167–174, 2023, doi: 10.21107/SIMANTEC.V11I2.20034.
F. S. Febriyani and A. Arfriandi, “Implementasi Algoritma RC4 pada Sistem Pengamanan Dokumen Digital Soal Ujian,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 6, no. 3, pp. 171–177, 2021, doi: 10.14421/jiska.2021.6.3.171-177.
A. A. Bai’at, M. R. Fahlevvi, and W. Ariandi, “Metode Algoritma RC4 (Rivest Code 4) Untuk Pengamanan Database Transaksi Pada Glory Digital Sablon,” Explore, vol. 13, no. 1, 2023, doi: 10.35200/ex.v13i1.33.
J. Jayachitra, H. Arshad, and R. Muthukumaran, “Cloud Storage and Secure File Sharing Using Blockchain with Xchacha20 and Shake Cryptography,” Proceedings - 2024 IEEE 16th International Conference on Communication Systems and Network Technologies, CICN 2024, pp. 578–583, 2024, doi: 10.1109/CICN63059.2024.10847520.
I. Putu, A. Brama, P. C. Negara, M. Naufal, N. Abror, and N. R. Tarigan, “Studi Literatur Mengenai Kinerja Blowfish, AES, Chacha20, dan GCM Dalam Sistem Keamanan Data,” Trigonometri: Jurnal Matematika dan Ilmu Pengetahuan Alam, vol. 6, no. 1, pp. 31–40, 2025, doi: 10.3483/TRIGONOMETRI.V6I1.10133.
R. F. Abdul and S. Arumugam, “A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity,” Advances in Technology Innovation, vol. 10, no. 1, pp. 15–28, 2025, doi: 10.46604/AITI.2024.14114.
S. A. Gebereselassie and B. K. Roy, “Secure Image Encryption Algorithm based on Two-Level Diffusion and Hybrid Chaotic Maps,” Conference Proceedings - 2023 IEEE Silchar Subsection Conference, SILCON 2023, 2023, doi: 10.1109/SILCON59133.2023.10404972.