全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

一种基于Android系统的短信息移动分级安全方法
A mobile classification security method for SMS based on Android system

DOI: 10.7523/j.issn.2095-6134.2015.02.019

Keywords: 短信息,移动分级安全,Android系统,基于签名的序列加密,RSA
SMS
,mobile classification security,Android system,sequence encryption based on digital signature,RSA

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要 针对智能手机难以全面保障短信息传输的安全, 提出一种新的基于Android系统的短信息移动分级安全方法.对一般用户短信息, 使用计算复杂度较低的序列加密;对涉及商业信息安全的短信息, 使用基于RSA数字签名的序列加密;对含有用户账号密码的重要短信息, 使用基于数字签名的RSA非对称加密.仿真实验和实际应用表明, 这种移动分级安全方法, 加密的密文中的"0"和"1"接近等概率分布, 具有比特效应, 且性能稳定, 适合应用于资源受限的手机或其他移动终端.

References

[1]  Lisonek D, Drahansky M.SMS encryption for mobile communication [C]//International Conference on Security Technology. Hainan Island, 2008: 198-201.
[2]  Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. 1978, 21(2):120-126.
[3]  <p> 谷利泽, 郑世慧, 杨义先. 现代密码学教程[M]. 北京:北京邮电大学出版社,2013:218-219.
[4]  Briceno M, Goldberg I, Wagner D. Apedagogical implementation of the GSM A5/1 and A5/2 "voice privacy" encryption algorithms [EB/OL]. (1999) [2014-03-30].http://cryptome.org/gsm-a512.htm.
[5]  Barkan E, Biham E, Keller N. Instant ciphertext-only cryptanalysis of GSM encrypted communication [J]. Lecture Notes in Computer Science, 2003:600-616.
[6]  Hussain I M, Ajmal A. SMS Security based on 2-way handshaking method using data hiding algorithm[J]. International Journal of Electronics, Computer and Communications Technologies, 2013, 3(4): 26-33.
[7]  Albuja J P, Carrera E V. Trusted SMS communication on mobile devices [C]//11th Brazilian Workshop on Real-Time and Embedded Systems. Pernambuco, Brazil, 2009:165-170.
[8]  隋爱芬, 杨义先. 第三代移动通信系统的安全[J]. 世界电信, 2004, 16(5): 37-40.
[9]  Harb H, Farahat H, Ezz. SecureSMSPay: secure SMS mobile payment model [C]//2nd International Conference on Anti-counterfeiting, Security and Identification, ASID. Guiyang, China, 2008: 11-17.
[10]  William S.Cryptography and network security: principles and practice [M]. Prentice Hall,2010:320-321.</p>

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133