eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35,  Peer-reviewed, Open-access Journal

A News Letter Sign UP!
SECURITY ASSURANCE FRAMEWORK FOR SMS USING CASCADED ENCRYPTION ALGORITHM

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.4 Issue 1, pp 47-55,Year 2015

SECURITY ASSURANCE FRAMEWORK FOR SMS USING CASCADED ENCRYPTION ALGORITHM

Reynaldo E. Castillo,Gerald T. Cayabyab,Bartolome T. Tanguilig III

Correspondence should be addressed to :

Received : 20 February 2015; Accepted : 25 February 2015 ; Published : 28 February 2015

Share
Download 125
View 178
Article No. 10462
Abstract

Security assurance in any telecommunication lines is a necessity. It is everyone’s desire to maintain secrecy of any information sent thru both unsecured and secured telecommunication lines. Short Message Service (SMS) has turned into an extension and has been an important part in the life of its user. Payment, mobile banking, important reminders such as stocks and news alerts, traffic updates, weather information and business related information are being catered thru SMS. Problems of privacy and imitations are the core issues dealt in the study. In order to prolong the secrecy of any information, an implementation of an improve cryptology scheme was designed. The study used a cascaded encryption process designed for sending SMS thru any communication line. The strength of the algorithm using the framework focused on designing a secured encryption process and adapting AES (Advance Encryption Standard) encryption with two more encryption layers. It discussed impact of the framework upon encryption process. This paper defined possible parameters which are focused on threat and risk analyses and prevention, technical and architectural requirements. The combined scheme provides further authenticity, security, privacy protections. During transmission or while in storage, security is still a significant concern to electronic information frameworks against coincidental or unlawful obliteration or modification. Cascaded encryption algorithm is one of the ways to ensure information security to which intended parties are able to read and access the confidential information. Aside from the cipher key used in the algorithm is of 128 bits, the approach had utilized 2 more layers for more confusion. Therefore, to the get the plaintext and cipher key an attacker has to check 2128*n possibilities where n is the number of substitution and fold-shifting process which are practically almost impossible.

Key Words   
AES; Encryption; Decryption; Plain Text; Cipher Text; SMS; Informat
Copyright
References
  1. Nishika and R. Yadav,"Cryptography on Android Message Applications – A Review", Nishika et.al / International Journal on Computer Science and Engineering (IJCSE)
  2. Madhwani, “Cryptography On Android Message Application using Look Up Table and Dynamic Key (Cama)”, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 2 (Sep-Oct.2012), PP 54-59
  3. Pan, Q. Ding and N. Qi , “The Research of Chaos-based SMS Encryption in Mobile Phone”, 2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control.
  4. Lewis, “Making Smart Cards work in the enterprise”, SANS Institute InfoSec Reading Room, SANS Institute 2002,http://www.sans.org/reading_room/whitepapers/authentication/making-smart-cards-work-enterprise_138 [retrieved: April, 2011].
  5. Diament, H. Lee, A. Keromytis, and M. Yung,” The efficient dual receiver cryptosystem and its application”, International Journal of Network Security, Vol. 13, pp. 135-151, November 2010.
  6. Zibideh and M. Matalgah, “Modified-DES encryption algorithm with improved BER performance in wireless communication”, 2011 IEEE Radio and Wireless Symposium (RWS), pp. 219-224, Phoenix, AZ, January 2011, in press.
  7. Rakers, L. Connell, T. Collins, and D. Russel, “Secure contactless smartcard ASIC with DPA protection”, IEEE Journal of Solid-State Circuits, Vol. 36, Issue 3, pp. 559-565, 2001.
  8. Grabbe, “The DES algorithm illustrated”, Laissez Faire City Times, Vol. 2, No. 28. (http://www.doc88.com/p- 281792313650.html) [retrieved: April, 2011].
  9. Lisoněk, M. Drahanský,"SMS Encryption for Mobile Communication", 2008 International Conference on Security Technology
  10. Gilman, “Encryption of data”, Encyclopedia of Espionage, Intelligence, and Security. (http://www.faqs.org/espionage/Ec- Ep/Encrption -of-Data.html) retrieved: April, 2011].
  11. Coppersmith, "The data encryption standard (DES) and its strength against attacks", IBM Journal of Research and Development, Vol. 38, Issue. 3, pp. 243-250, May 1994.
  12. PriyankaPimpale, Rohan Rayarikar and SanketUpadhyay, “Modifications to AES Algorithm for Complex Encryption”, IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011.
  13. Racherla and D. Saha, "Security and Privacy Issues in Wireless and Mobile Computing, IEEE 2000
  14. Zhang and K. Parhi Approaches for the AES,IEEE 2002
  15. Rayarikar,S. Upadhyay and P. Pimpale,"SMS Encryption using AES Algorithm on Android", International Journal of Computer Applications (0975 – 8887) Volume 50– No.19, July 2012
  16. Hassinen and Hypponen,"Strong Mobile Authentication". IEEE 2005
  17. Žitovský, Šifrováníkomunikacemobilníchzařízenípomocí Java ME (Communication Encryption of Mobile Devices using Java ME), Master thesis, Masaryk University Faculty of Informatics, Brno, 2007Hassinen and Hypponen,"Strong Mobile Authentication". IEEE 2005
  18. http://www.spyphones.biz/index.php?categoryID=83
  19. GOOGLE 2008, WIKIPEDIA.COM, http://en.wikipedia.org/wiki/A5/1
  20. http://developer.android.com/about/index.html
  21. http://developer.android.com/sdk/index.html?hl=sk
  22. Mohsen Toorani, Ali AsgharBeheshtiShirazi, “Solutions to the GSM Security Weaknesses”, the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, 2008 IEEE, pp. 576-581.
  23. NeeteshSaxena and Ashish payal, “Enhancing Security System of Short Message Service for M-Commerce in GSM”, International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: 2229-3345 Vol. 2 No. 4, April 2011, pp. 126-133.
  24. Al Tamimi, A., Peromance Analysis of Data Encryption Algorithms.
  25. Savola, R., “Software Security Assurance Telecommunication Systems”, 2009 IEEE.
  26. Nishika et.al, “Cryptography on Android Message Applications – A Review”, International Journal on Computer Science and Engineering, Vol. 5 No. 05 May 2013.
  27. David Celdran: The Philippines – SMS and Citizenship
  28. Pourali, A., “The Presentation of an Ideal Safe SMS based model in mobile electronic commerce using Encryption hybrid algorithms AES and ECCC”, 2014 IEEE.
  29. http://www.esru.strath.ac.uk/EandE/Web_sites/10-11/Mobile_mast/bts.htm
  30. http://www.techopedia.com/definition/2927/base-transceiver-station-bts
  31. http://www.techopedia.com/definition/2927/base-transceiver-station-bts
  32. http://www.techopedia.com/definition/8448/mobile-switching-center-msc
  33. http://nutsmumbai.co.in/wp-content/uploads/2013/06/SMS-Encryption-using-AES-Algorithm-on-Android-Paper-2012.pdf
  34. http://security.stackexchange.com/questions/11493/how-hard-is-it-to-intercept-sms-two-factor-authentication
  35. T. Marler and J.S. Arora, “Survey of multi-objective optimization methods for engineering,” Struct. Multidisc. Optim. 26, pp. 369–395, 2004.
  36. A. M. Belal, M. K. Hasan, I. A. Nusair and N. M. Badra, 2012, “Applying Integer Linear Modeling to solve Time-Cost Tradeoff Problems in Construction Projects,”Journal of Al Azhar University Engineering Sector, Cairo, Vol. 7, No. 24, pp. 753-760, July 2012.
To cite this article

Reynaldo E. Castillo,Gerald T. Cayabyab,Bartolome T. Tanguilig III , " Security Assurance Framework For Sms Using Cascaded Encryption Algorithm ", International Journal of Latest Research in Science and Technology . Vol. 4, Issue 1, pp 47-55 , 2015


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.