This document discusses encryption and decryption techniques using Bluetooth proximity on mobile devices. It begins with an abstract that outlines using an encryption algorithm to convert meaningful file information into unintelligible data that cannot be read without decrypting. The encryption key would be the Bluetooth MAC address of a registered device. The introduction explains using AES encryption to encode files into unreadable data, with the Bluetooth MAC address as the decryption key. It also discusses how encryption provides data security for wireless communication. The document then reviews cryptography purposes like authentication and confidentiality. It examines symmetric key cryptography using the same key for encryption and decryption, and public key cryptography using different keys. It also defines plain text, cipher text, and encryption/