The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA); integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
References
[1]
Shaza, D.R., Ahmed, K., et al. (2012) A Performance Comparison of Encryption Algorithms AES and DES. International Journal of Engineering Research and Technology, 4, 151-154.
[2]
Singh, S., Maakar, S.K. and Kumar, D.S. (2013) Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 464-471.
[3]
Toorani, M. and Beheshti, S.A.A. (2008) A Secure SMS Messaging Protocol for the M-Payment Systems. IEEE Symposium on Computers and Communications, Marrakech, 6-9 July 2008, 12-15. https://doi.org/10.1109/ISCC.2008.4625610
[4]
Gin, A. and Hunt, R. (2008) Performance Analysis of Evolving Wireless IEEE 802.11 Security Architecture. Proceedings of the 5th International Conference on Mobile Technology, Applications and Systems, Mobility Conference 2008, Yilan, September 2008, 50-57. https://doi.org/10.1145/1506270.1506393
[5]
Rupa, Ch. and Avadhani, P.S. (2009) Message Encryption Scheme Using Cheating Text. 6th International Conference on Information Technology: New Generations, Las Vegas, 27-29 April 2009, 470-474. https://doi.org/10.1109/ITNG.2009.232
[6]
Ahonlu, T.T. (2011) Time to Confirm Some Mobile User Numbers: SMS, MMS, Mobile Internet, M-News. Communities Dominate Brands.
[7]
ESTI (2006) Analysis of the Short Menage Service (SMS) and Call Broadcast Service (CBS) for Emergency Menaging Application; SMS and CBS.
[8]
Sharad, K.V. and Ojha, D.B. (2014) An Approach to Enhance the Mobile SMS Security. Journal of Global Research in Computer Science, 5, 25-30.
[9]
Han, E. (2015) Cheaper Mobile Calls and Text as ACCC Moves to Slash Wholesale Fees.
[10]
Wiley, H. (2010) SMS the Creation of Personal Global Text Menaging.
[11]
Black, K. (2016) What Is SMS Marketing? WiseGEEK.
[12]
Portio Research (2014) Portio Research Mobile Menaging Futures 2014-2018.
[13]
Sagheer, A.M., Abdulhameed, A.A. and Abduljabbar, M.A. (2013) SMS Security for Smartphone. 6th International Conference on Developments in eSystems Engineering, Abu Dhabi, 16-18 December 2013, 32-35.
https://doi.org/10.1109/DeSE.2013.57
[14]
Biggs, N. (2008) Codes: An Introduction to Information Communication and Cryptography. Springer, Berlin, 171. https://doi.org/10.1007/978-1-84800-273-9
[15]
Loon Ng (2016) Short Message Service (SMS) Security Solution for Mobile Devices. Master’s Thesis, Naval Postgraduate School, Monterey.
[16]
Lisoněk, D. and Drahansky, M. (2008) SMS Encryption for Mobile Communication. IEEE International Conference on Security Technology, Hainan Island, 13-15 December 2008, 198-201. https://doi.org/10.1109/SecTech.2008.48
[17]
Sharbaf, M.S. (2011) Quantum Cryptography: An Emerging Technology in Network Security. IEEE International Conference on Technologies for Homeland Security, Waltham, 15-17 November 2011, 13-19.
https://doi.org/10.1109/THS.2011.6107841
[18]
Mahayam, P. and Shachdera, A. (2013) A Study of Algorithms AES, DES and RSA for Security. Global Journal of Computer Science and Technology, Web and Security, 13, 140.
[19]
Ashioba, N.C. and Yoro, R.E. (2014) RSA Cryptosystem Using Object Oriental Modeling Technique. International Journal of Information and Communication Technology Research, 4, 57-61.
[20]
King, D.A. (2001) The Ciphers of the Monks—A Forgotten Number Notation of the Middle Ages. Frdriz Steiner, Stuttgart.
[21]
Ibrahim, A. (1991) Cryptography and Data Security: Cryptographic Properties of Arabic. Proceeding of the third Saudi Engineering Conference, Riyadh, 24-27 November 1991, Vol. 2, 910-921.
[22]
Huurdeman, A.A. (2003) The Worldwide History of Telecommunications. John Wiley & Sons, Hoboken, 529. https://doi.org/10.1002/0471722243
[23]
Sauter, M. (2014) From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband. Second Edition, John Wiley & Sons, Hoboken.
[24]
Owano, N. (2011) GSM Phones—Call Them Unsafe: Says Security Expert.
[25]
NGMAST (2008) Solutions to the GSM Security Weakness. Proceedings of the 2nd IEEE International Conference on Next Generation Mobile Applications, Services, and Technologies, Cardiff, September 2008, 576-581.