Design and Implementation of Android Based Text Encryption and Decryption Technique
Abstract
Full Text:
PDFReferences
I. B. Cioc, M. Jurian, I. Lita, and R. M. Teodorescu, A method for increasing security in electronic communication servicies based on text messages communication, Electronics, Computers and Artificial Intelligence (ECAI), 2015 7th International Conference on, 2015, AE–23p.
R. Rayarikar, S. Upadhyay, and P. Pimpale, SMS Encryption using AES Algorithm on Android, Int. J. Comput. Appl., 2012.50.(19):12–17p.
J. Majumder, S. Das, and S. Maity, SMS encryption in android platform, 2015:8p.
Z. P. Buba and G. M. Wajiga, Cryptographic algorithms for secure data communication, Int. J. Comput. Sci. Secur. IJCSS.2011.5(2):227–243p.
Why is XOR important in cryptography? - Quora. [Online]. Available: https://www.quora.com/Why-is-XOR-important-in-cryptography. [Accessed: 02-Feb-2019].
tutorialspoint.com, Cryptography Hash functions, www.tutorialspoint.com. [Online]. Available: https://www.tutorialspoint.com/cryptography/cryptography_hash_functions.htm. [Accessed: 02-Feb-2019].
How is an S-box constructed in AES? - Quora. [Online]. Available: https://www.quora.com/How-is-an-S-box-constructed-in-AES. [Accessed: 02-Feb-2019].
message digest generation using sha 512 - Google Search. [Online]. Available: https://www.google.com/search?q=message+digest+generation+using+sha+512&rlz=1C1CHBD_enBD823BD823&source=lnms&tbm=isch&sa=X&ved=0ahUKEwj80LqSiZvgAhUWOSsKHYsaB0YQ_AUIECgD&biw=1366&bih=626#imgrc=piLEnVVNqsKcMM: [Accessed: 01-Feb-2019].
“SHA 512 Processing of a Single 1024- bit block - Google Search.” [Online]. Available: https://www.google.com/search?rlz=1C1CHBD_enBD823BD823&biw=1366&bih=626&tbm=isch&sa=1&ei=cYNUXKm2D4v69QPTp5PQCg&q=SHA+512+Processing+of+a+Single+1024+bit+block+&oq=SHA+512+Processing+of+a+Single+1024+bit+block+&gs_l=img.3...69784.69784..71377...0.0..0.116.116.0j1......0....2j1..gws-wiz-img.WFnrFe5qjN0#imgrc=05o6fERXOeKVUM: [Accessed: 01-Feb-2019].
I. U. Rehman, What Is A Brute Force Attack?, The Official Cloudways Blog, 07-Feb-2018. [Online]. Available: https://www.cloudways.com/blog/what-is-brute-force-attack/. [Accessed: 01-Feb-2019].
Refbacks
- There are currently no refbacks.