Articles | Open Access |

ENCRYPTION AND DATA PROTECTION TECHNOLOGIES FOR ENHANCING USER SECURITY IN WEB APPLICATIONS

Baxromov Omadillo Baxromjon ugli , 4th-year student of the Information Systems and Technologies program at Andijan State Technical Institute

Abstract

In the modern digital environment, web applications have become a primary platform for storing, processing, and transmitting sensitive user information, including personal data, authentication credentials, and financial records. As the number of cyber threats and data breaches continues to increase, ensuring the confidentiality, integrity, and availability of user data has become a critical challenge for web developers and organizations. This study focuses on the role of encryption and data protection technologies in enhancing web application security. The paper examines both symmetric and asymmetric cryptographic algorithms, secure communication protocols, hashing mechanisms, and authentication strategies used to protect user information from unauthorized access and malicious attacks. The research analyzes widely adopted encryption standards such as AES, RSA, and ECC, as well as modern transport-layer security protocols including HTTPS and TLS. Additionally, the study explores best practices for secure password storage, data encryption at rest and in transit, and the integration of encryption mechanisms within modern web architectures. Through a systematic methodology, the effectiveness of these technologies is evaluated in terms of security strength, performance impact, and implementation complexity. The findings highlight the importance of adopting a layered security approach and demonstrate that properly implemented encryption technologies significantly reduce the risk of data leakage and cyberattacks. The results of this research provide practical recommendations for developers and organizations aiming to build secure, trustworthy, and resilient web systems.

Keywords

Web security, user data protection, encryption technologies, cryptographic algorithms, data privacy, HTTPS, TLS, authentication, hashing, cybersecurity

References

Kahn Academy. (2022). Cryptography and network security.

Stallings, W. (2021). Cryptography and Network Security: Principles and Practice. Pearson.

Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol. IETF RFC.

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory.

Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM.

NIST. (2020). Digital Signature Standard (DSS).

OWASP. (2023). OWASP Top 10 Web Application Security Risks.

Schneier, B. (2015). Applied Cryptography. Wiley.

Green, M., & Smith, M. (2016). Cryptopals crypto challenges. Security Research Journal.

Mozilla Foundation. (2022). Web security guidelines and HTTPS adoption.

Anderson, R. (2020). Security Engineering. Wiley.

ISO/IEC 27001. (2022). Information security management systems.

Cloudflare. (2023). The importance of encryption in modern web applications.

Veracode. (2023). State of Software Security Report.

ENISA. (2022). Cybersecurity and data protection in web systems.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

ENCRYPTION AND DATA PROTECTION TECHNOLOGIES FOR ENHANCING USER SECURITY IN WEB APPLICATIONS. (2026). International Journal of Artificial Intelligence, 6(01), 1360-1365. https://www.academicpublishers.org/journals/index.php/ijai/article/view/10185