Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017
Encryption is process of turning a plaintext to jargon or the method of changing confidential file to jargon in order prevent unauthorized persons to gain access to confidential message. Message is the transfer of information from the sender to the receiver through a particular medium. Encryption is the most effective process for achieving data security. The process of Encryption hides the contents of a message in a way that the original information is recovered only through a decryption process. This paper presents an Encryption/Decryption application of messages on both java and Android phones. The method of encryption of message in this paper is AES (Advance Encryption System) where the same key that is used to encrypt is used to decrypt. The Encryption key is entered into the mobile phone text field by the user. The same encryption key is also used to decrypt the encrypted binary file.
Journal of Telecommunications System & Management, 2016
Today data communication is a modern technology that contains a powerful computer processor to exchange information. But brute force attacks are made to break the encryption techniques and these attacks are the main drawbacks of older algorithms. This paper is concerned with the development of a secure messaging system based on cryptographic algorithms that is which is more faster, better immune to attacks, more complex, easy to encrypt and many more advanced security feature included. This project work is designed and developed for a secure messaging both in web and android platforms. The application is well featured and provides encryption/decryption that can protect message from unauthorized access and disclosure over networks. To send message, a recipient or registered user types and encrypts a text message using keyword mono-alphabetic substitution algorithm with a key, selected from key list. The encrypted message is stored in the database and receiver's inbox with serial number of key (not the value). The receiver, after log into his/her own account, selects the key value and then decrypts the encrypted message with the key to see the original message. With compared to other messaging systems, the proposed secure messaging system can be used for chat, messaging, video conferencing and real time file sharing in both web and android platforms.
International Journal of Engineering & Technology, 2018
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user during the creation of the account. The encryption keyword will be hashed by the system using MD5 Algorithm. The keys will remain in encrypted form, while they are on the server side. Both encrypted data, encryption and decryption keys will be saved on the server in secured form. The idea behind hashing the encryption keys is to protect the keys while they are stored on the server, therefore, any u...
2014
Billions of text messages are sent daily through GSM networks sent in plain text format which makes them susceptible to various attacks. With the increasing number of software crackers available for free in the internet, studies have shown SMS continues to suffer from several security vulnerabilities and loopholes. The aim of this project was to develop a secure messaging platform for Java enabled phones to securely send encrypted short messages via the GSM network.. The application was developed in MDIP 2.0 and CDLC 1.1configurations and applied symmetric encryption concepts. The experimental results revealed that the mobile application was able to encrypt, decrypt, send and receive text messages without adding changing the size of the packets .
IJCSMC, 2021
The users of mobile based on android were increasing currently even now mobile was almost the same computer one of which could be used to be done by every users mobile was save the individual important data. Saving the data on mobile was very risk because become hackers’ target. That was the reason of researchers want to add cryptography which the combination between Advance Encryption System (AES) dan Ron Rivest, Adi Shamir dan Len Adleman (RSA). The result of the second method above could do cryptography data on mobile. With different encryption time where the file size; 25.44 KB, encryption time 4 second, 200 KB, 5 second, 600 KB 7 second, 2.29 MB, 10 second. Where decryption 25.44 KB, encryption 2 second, 200 KB, 1.5 second, 600 KB 2.5 second, 2.29 MB, 2.7 second.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Nowadays, SMS or messaging is a very common way of communication. So, it differs from the apps and instant messaging available but SMS is still one of the broad communication methods as it does not require internet connection and sending inexpensive, fast and modest SMS messages. When confidential information is replaced by SMS, it is difficult to protect information from secure SMS and ensure that the message is sent only by approved senders. This research reviews and describes several methods used to encrypt SMS massage on android based on the encryption algorithm and compare these methods.
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.
IJCSMC, 2019
Communication has been a major factor in human’s everyday life. The advancement of information technology changed the method of online transactions. No one uses SMSs that frequently to pass messages from one to another because of the arrival of the free data services and cheap data packs from the ISPs. But SMS still plays a very vital role in our day to day lives and its theft is increasing concerns to secure it. No airline or bank or subscription services send their transaction details through any web appl ication but through SMS. SMS plays an important role in online transactions .With the increasing use of SMS for communication and information exchange, care should be taken when sensitive information is transmitted using SMS. Users should be aware that SMS messages might be subject to interception. Solutions such as encrypted SMS should be considered if there is a need to send sensitive information via SMS. The messages are encrypted by strong cryptographic algorithms. The encrypted message received by the customer decrypt the message by authentication. This is only known to user. It uses RSA algorithm for secure keys and AES algorithm to secure message. Authentication is implemented by using pattern lock. This system provide secure and reliable communication environment.
2015
Since mobile phones have become a must-have item, sending messages using text-based messaging or Short Message Service (SMS) through mobile phones becomes something that is almost done every day. A short message is one form of communication services that are already widely used and widely known at this time because it is easy to use and cheap. Utilization of text characters as the media, not only provides ease of use, but also can cause delivery problems of the security of the message content. Another issue is due to the short message using a universal coding standard. Short message has been sent can be captured by the operator or by third parties using a tool that is not expensive. In the message contains the data sender and the recipient's phone number and the content of the message itself. So that short messages can be easily replaced and falsified by third parties. This triggered concerns because sometimes a short message is used to exchange confidential messages. To overcom...
… Conference on Machine …, 2009
In this paper, we describe a system for securing SMS messages during and after its transmission over mobile network. The system can also be used for protecting personal data for users who desire to keep their confidential data stored on their mobile phones. The system has been implemented employing the AES encryption algorithm and using symmetric-key encryption. The system has been tested using various devices. The testing and validation of the system is also reported.
Different methodologies had been used in recent years to get out of these security issues using distributed database and distributed architecture. Encryption and decryption are the main techniques while there way of implementation is different. But one thing is being ignored that battery powered consumption vary from one way of implementation to other. In this work, we calculate the energy Consumption and other differences between different encryption decryption methodologies like DES and AES. AES-256 becomes implementable when we use block cipher properly. Block Cipher shows no issue when using AES-128 but it do when we use it improperly in AES-256 .The result shows that DES used 56 bit key size which can give 7.2 x 10 16 whereas AES used 128 bit key size which can give 3.4 x 10 39 different possible combination which show it is more secure. AES can also use 256 bit which can 1.1 x 10 77 combination which is not only more secure but also encryption time is dramatically decrease to 30-40 percent which will directly increase battery consumption time. After using this AES-256 will becomes implementable and all of its advantages which are mentioned above could be fully useable.
Journal of Software Engineering and Applications, 2020
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed-Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed-Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA); integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
Procedia Computer Science, 2015
Instant Messaging in mobile devices can be considered one of the most used services in mobile communications. Security properties such as integrity and confidentiality must be maximized. This paper proposes a new symmetric encryption mechanism for instant text messaging in mobile devices. Our mechanism uses a sequence of prime numbers obtained from a bi-dimensional matrix and a secret key for the encryption process. The proposed solution has been compared with other well-known algorithms such as DES, RSA, MD5, AES. Results show that our mechanism is suitable for the encryption of instant text messaging in mobile devices due to its low complexity, performance, and robustness
2021
ABSTRAK Advances in computer science and technology have affected every aspect of human life, including education. Information and data can be easily and quickly sent to consumers via a computer network. Data and information can be easily and quickly accessed by users through a computer network. Of course, this is dangerous if unauthorized persons have access to the data transmitted and cause a data breach or leakage. Security issues are one of the most important aspects of information systems. In particular, technological advances in data security systems to maintain data security have grown rapidly. Scientific disciplines such as encryption and steganography are being developed to maintain data security. (Program et al., 2016) In the implementation of not only one security technique, but can be done in combination in the security of information data. This research aims to create data security by applying cryptography to text messages, document files, and images online with advanced encryption standard (AES) algorithm calculation methods. AES is a cryptographic algorithm that can be used to eat data where the algorithm is a symmetric chipertext block that can encrypt and decrypt information. The result of the study is that users can encrypt text messages, document files, and images so that the security of the information data can be maintained because of security. (Ikbal, 2007)
his research work aim at design and implementation of a simple application system for encryption and decryption of information sent from one person to another on data communication system. In this research work the concept of secret key cryptography was used to implement the application system. The research work was implemented with the use of a Java Programming language. The program designed handles both the encryption and decryption. The application system developed was tested and the result was presents with aid of users interface.
2011
The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In this paper we propose a fast and secure encryption algorithm using substitution mapping, translation and transposing operations. The proposed symmetric encryption technique has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. In this paper, the encryption and decryption procedures are explained and the performance is compared with popular e...
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.
IRJET, 2021
Encryption is especially important if confidential details will be transmitted over the internet. A text message is one of the main means of information trade between mobile users. SMS security is one of the major issues to be addressed during statistics transfer. Therefore, the use of Android technological know-how the system is developed by us that allows the sender to enter the code in the messages before it is sent over the internet for this reason, the encryption manner, as a cryptographic algorithm, we used the Advanced Encryption Standard (AES). The app permits the consumer to enter a key and Already Exists a message to encrypt and therefore generate encrypted messages that can be deleted in writing by the recipient. The encrypted text developed through the appeals resists Brute-Force attacks as we use AES.
In this paper we are going to encrypt plain text to encrypted text. Message encryption is character value based encryption in which 3D message character matrix is replaced with 2D encryption value matrix. It can also know by some kind of message masking which work on upper level to provide maximum security. Password protection increases encrypted message file security.
IRJET, 2022
The involvement of generation in our existence makes it more boost and affords get right of entry to our fingertip. It provides us with the capability to get connected with human beings and discover the data on the topics which could be very useful for the ease of existence. Hence our lives are dependent on numerous mobile chatting applications which offer exclusive protection to user and chatting information but leads to boom in vulnerabilities and threat of attack on facts. As in sensitive enterprise and prison conversation records safety is maximum important for stopping from undesirable hacking activities. To overcome this form of state of affairs, it's miles proposed an encrypted messaging protocol for secure conversation. Inside the International messaging, there is lots of encrypted messaging applications, however all those are based totally on a software generated encryption key in conjunction with SQLite database which is used to keep the message of respective customers which are now not comfy and the messages of any consumer can be obtained by a 3rd party. The proposed software used the Elliptic Curve Diffie Hellman Key change (ECDH) set of rules to generate the important thing pair and alternate to supply the shared key to be able to be used for the encryption of statistics by symmetric algorithms. The proposed utility lets in the customers to talk via textual content messages, voice messages and snap shots. For the text message protection the same old AES algorithm with a 128 bit key are used. The generated key (160 bit) minimized to 128 bit period via deciding on the primary 128 little bit of the generated key in order to be used by the AES set of rules. For the voice and photo protection procedures the proposed utility used the symmetric set of rules RC4 for this purpose
Zambia ICT journal, 2020
Currently, mobile applications are playing a major role in many areas such as banking, social networking, financial apps, entertainment and many more. The increase in number of applications succumbs to several security vulnerabilities and thus focus should be given to security. As the number of vulnerabilities and, hence, of attacks increase, mobile applications need to be assessed and ensure that secure coding practices have been followed during development. Mobile application security breach can lead to fraudulent transactions through mobile applications, confidentiality and revenue loss through communications services misuse. Data that is shared on an unsecured channel is vulnerable to attacks and to stop unauthorized access to this data, there is need to encrypt the data before it is sent to the server. In this research work, different cryptographic algorithms for encrypting data and secure data sharing in mobile applications across communications channels were examined. Simulation methodology was used to investigate a suitable cryptographic algorithm and to design a security framework for mobile applications to solve mobile application security problems. The proposed framework employs the use of Advanced Encryption Standard (AES) algorithm for encrypting meter readings data being exchanged between a smart phone and a server. The meter reading datasets used in this research were obtained from the Water Utility Mobile Application for Meter Reading. The results obtained from the simulation of the security framework, showed that four fields namely: Account number, image path, meter number and phone number on which AES encryption was applied were in an unreadable format (ciphertext), implying that the fields have been successfully encrypted. This solution allows application users (meter readers) to transfer (upload readings) data between a smart phone and database server in a secure manner without facing the problem of data attack. Data being uploaded to the server is encrypted before it is transferred and decrypted once it reaches the server side. This solution addresses android application security in the application and network communications layers and data transmission. The research paper ensures information security is guaranteed between an organisation and its customers.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.