Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones

P. Padmanabham*, Shahebaz Ahmed Khan**
* Professor, Department of Computer Science and Engineering, Bharat Institute of Engineering and Technology, Telangana, India.
** P.G Scholar, Department of Computer Science and Engineering, Bharat Institute of Engineering and Technology, Telangana, India.
Periodicity:November - January'2015
DOI : https://doi.org/10.26634/jmt.1.4.3519

Abstract

The aim of this paper is to study the symmetric algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. and to analyse their performance, mainly their beats and end memory requirements are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. All the above algorithms will be first implemented in C, C++ or JAVA and their performances will be analysed. The suitable algorithm will be ported onto the mobile phones using Android. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving even a single digit. The message will be decrypted only after the full key version has matched with the given symmetry of the key. This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.

Keywords

Symmetric Algorithms, Data Encryption Standard (DES), Advanced Encryption Standard (AES), 3DES, Full key, Cryptography, Non-Repudiation.

How to Cite this Article?

Padmanabham, P., and Khan, S.A. (2015). Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 33-38. https://doi.org/10.26634/jmt.1.4.3519

References

[1]. Atul Kahate (2008). “Cryptography and Network Security”, Tata McGraw-Hill Companies.
[2]. William Stallings (2004). “Network Security Essentials (Applications and Standards)”, Pearson Education.
[3]. Ronald L. Rivest, (1995). “RC5 Encryption Algorithm”, Dr. Dobbs Journal, Vol. 226, pp. 146-148.
[4]. Ronald L. Rivest, (1997). “The RC5 Encryption Algorithm”, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139, Available at: httu://theory.lcs.mit.cdu/-rivest/Rivest-rc5rev.pd.
[5]. Khawlah A. AI-Rayes, Aise Zulal Sevkli, Hebah F. AIMoaiqel, Haifa M. AI-Ajlan, Khawlah M. AI-Salem, Norah I. AI-Fantoukh (2011). "A Mobile Tourist Guide for Trip Planning" IEEE Multidisciplinary Engineering Education Magazine, Vol. 6, No. 4.
[6]. MIDP_Mobile_Media_API_Developers_Guide_v2_en
[7]. Daemen, J., and Rijmen, V (2001). "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal.
[8]. R.L. Rivest, A. Shamir, and L. Adleman, (1978). “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Vol. 21.
[9]. “Detecting passive content leaks and pollution in android applications,” in Proceedings of the Network and Distributed System Security Symposium.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.