Open Access Open Access  Restricted Access Subscription Access

Design and Implementation of Android Based Text Encryption and Decryption Technique

Ahsan Ullah, Afzal Hossain

Abstract


The rise of internet has created a major challenge for securing sensitive information sent over the network. Several solutions have been proposed in the past to protect user data. Encryption algorithm is one of them. At present, various types of encryption algorithms like AES, DES, RSA and others are available. In this report, we have proposed an algorithm for ourselves which is 128-bit text size and 128-bit key size. We have compared the proposed algorithm with different algorithm comparisons. The result is showing our proposed algorithm gives better performance. By the difference we see that our recommended encryption process's average runtime is 0.006 sec which is less than other algorithms (AES, DES). It also protects various cryptanalytic attacks - key attack, brute force attack, man in the middle attack and it is also suitable for the implementation of software and hardware.

Full Text:

PDF

References


I. B. Cioc, M. Jurian, I. Lita, and R. M. Teodorescu, A method for increasing security in electronic communication servicies based on text messages communication, Electronics, Computers and Artificial Intelligence (ECAI), 2015 7th International Conference on, 2015, AE–23p.

R. Rayarikar, S. Upadhyay, and P. Pimpale, SMS Encryption using AES Algorithm on Android, Int. J. Comput. Appl., 2012.50.(19):12–17p.

J. Majumder, S. Das, and S. Maity, SMS encryption in android platform, 2015:8p.

Z. P. Buba and G. M. Wajiga, Cryptographic algorithms for secure data communication, Int. J. Comput. Sci. Secur. IJCSS.2011.5(2):227–243p.

Why is XOR important in cryptography? - Quora. [Online]. Available: https://www.quora.com/Why-is-XOR-important-in-cryptography. [Accessed: 02-Feb-2019].

tutorialspoint.com, Cryptography Hash functions, www.tutorialspoint.com. [Online]. Available: https://www.tutorialspoint.com/cryptography/cryptography_hash_functions.htm. [Accessed: 02-Feb-2019].

How is an S-box constructed in AES? - Quora. [Online]. Available: https://www.quora.com/How-is-an-S-box-constructed-in-AES. [Accessed: 02-Feb-2019].

message digest generation using sha 512 - Google Search. [Online]. Available: https://www.google.com/search?q=message+digest+generation+using+sha+512&rlz=1C1CHBD_enBD823BD823&source=lnms&tbm=isch&sa=X&ved=0ahUKEwj80LqSiZvgAhUWOSsKHYsaB0YQ_AUIECgD&biw=1366&bih=626#imgrc=piLEnVVNqsKcMM: [Accessed: 01-Feb-2019].

“SHA 512 Processing of a Single 1024- bit block - Google Search.” [Online]. Available: https://www.google.com/search?rlz=1C1CHBD_enBD823BD823&biw=1366&bih=626&tbm=isch&sa=1&ei=cYNUXKm2D4v69QPTp5PQCg&q=SHA+512+Processing+of+a+Single+1024+bit+block+&oq=SHA+512+Processing+of+a+Single+1024+bit+block+&gs_l=img.3...69784.69784..71377...0.0..0.116.116.0j1......0....2j1..gws-wiz-img.WFnrFe5qjN0#imgrc=05o6fERXOeKVUM: [Accessed: 01-Feb-2019].

I. U. Rehman, What Is A Brute Force Attack?, The Official Cloudways Blog, 07-Feb-2018. [Online]. Available: https://www.cloudways.com/blog/what-is-brute-force-attack/. [Accessed: 01-Feb-2019].


Refbacks

  • There are currently no refbacks.