Book Details

ANDROID BASED ENCRYPTED SMS SYSTEM

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

The improvement of media communications innovation is so quick has given such extraordinary advantages. With the media transmission innovation, distance and time never again is a critical deterrent. One of the aftereffects of broadcast communications innovation that is notable is the Short Message Service (SMS). Android SMS is a local assistance that permits the clients to get SMS on cell phone and send messages to other telephone numbers. In this work an application is created on the cell phone to adjust the SMS message into ciphertext so the data content of the SMS isn't known by others. SMS conveyance framework for encoding messages into ciphertext utilizing a key that is placed by the shipper then, at that point, ships off the objective number. SMS gathering framework to unscramble it to others by means of SMS without the apprehension about data from these messages will be known by others. It utilizes normalized correspondence conventions that let cell phones trade short instant messages. Joined encryption has been proposed to authorize information classification while making information practical. It scrambles/decodes an information duplicate with a joined key, which is gotten by figuring the cryptographic hash worth of the substance of the information duplicate. After key age and information encryption, clients hold the keys and send the ciphertext to the beneficiary. The Messages conveyance server, and any individual or outsider who could get sufficiently close to information for messages and content sent between gadgets, will not have the option to peruse start to finish encoded messages since they don't have the key. The model is being created utilizing altered blowfish encryption and the code check is performed utilizing the MD5 hashing calculation.

References

[1] Ibrahim, N. and Sellahewa, H., "Touch gesture-based authentication: A security analysis of pattern unlock.", 2017, February.
[2] Hintze, D., Hintze, P., Findling, R.D. and Mayrhofer, R., "A large-scale, long-term analysis of mobile device usage characteristics.", 2017.
[3] Aviv, A.J., Maguire, J. and Prak, J.L., "Analyzing the impact of collection methods and demographics for android’s pattern unlock.", 2016.
[4] Aviv, A.J. and Dürmuth, M., "A Survey of Collection Methods and Cross-Data SetComparison of Android Unlock Patterns.", 2018.
[5] Hintze, D., Findling, R.D., Scholz, S. and Mayrhofer, R., “Mobile device usage characteristics: The effect of context and form factor on locked and unlocked usage.” 2014, December.
[6] Tsai, Y.C. and Yang, C.H., “Physical forensic acquisition and pattern unlock on Android smart phones.” 2013.
[7] Marques, D., Guerreiro, T., Duarte, L. and Carriço, L., “Under the table: tap authentication for smartphones.” 2013, September.
[8] Meng, W., Li, W., Wong, D.S. and Zhou, J., “TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones.” 2016, June.
[9] Findling, R.D., Muaaz, M., Hintze, D. and Mayrhofer, R., “Shakeunlock: Securely unlock mobile devices by shaking them together.” 2014, December.
[10] Khare, S., “Finger gesture and pattern recognition-based device security system.” 2015, March.

Keywords

Short Message Service, Encryption, MD5 hashing Algorithm.

Image
  • Format Volume 10, Issue 1, No 5, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Nithish Kumar B, Dr.T.Velumani*2
  • Reference IJCS-407
  • Page No 2770-2776

Copyright 2024 SK Research Group of Companies. All Rights Reserved.