Secure SMS System for Android
Lalit Kumar Gupta1 , Ananya Gupta2 , Akshay Singh3 , Abhishek Kumar4
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 179-183, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.179183
Online published on Mar 31, 2019
Copyright © Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar, “Secure SMS System for Android,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.179-183, 2019.
MLA Style Citation: Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar "Secure SMS System for Android." International Journal of Computer Sciences and Engineering 7.3 (2019): 179-183.
APA Style Citation: Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar, (2019). Secure SMS System for Android. International Journal of Computer Sciences and Engineering, 7(3), 179-183.
BibTex Style Citation:
@article{Gupta_2019,
author = {Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar},
title = {Secure SMS System for Android},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {179-183},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3816},
doi = {https://doi.org/10.26438/ijcse/v7i3.179183}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.179183}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3816
TI - Secure SMS System for Android
T2 - International Journal of Computer Sciences and Engineering
AU - Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 179-183
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1689 | 384 downloads | 230 downloads |
Abstract
Communication (from Latin communicare, meaning "to share") is the act of conveying messages from one entity or group to another through the use of mutually understood signs. It not only facilitates the process of sharing information and knowledge, but and also helps people to develop relationships with others. Security matters to people differently. However, it is always required. Same is with our shared information. The main purpose of this paper is to introduce security of the text messages that people share among them. In this paper, we are presenting Secure SMS System for Android users, thus providing an End-to-End Encryption (E2EE). RSA algorithm of Cryptography and a Key generation algorithm have been used. Whenever a message is sent, it is not sent as a plain text; rather it is encrypted using the public key of the receiver to get the cipher text, which is transmitted to the receiver. At the receiver side, that cipher text is decrypted using the private key of the receiver, to get the plain text, the actual message that is sent to him. This would prevent the third parties from interfering into the text messages shared. This implementation can then be used by people in general as well as all the intelligence agencies.
Key-Words / Index Term
Cryptography, Encryption, Key, Cipher text
References
[1] Delfs, Hans & Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications.
[2] Hacker Lexicon: What Is End-to-End Encryption?".WIRED. 2014-11-25.
[3] RIVEST, Ronald L.; SHAMIR, Adi; ADLEMAN, Len. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM; 1978; 21.2: 120-126.
[4] Johnson, J.; Kaliski, B. (February 2003). "Public-Key Cryptography Standards (PKCS) : RSA Cryptography Specifications Version 2.1.
[5] RIVEST, Ronald L.; SHAMIR, Adi; ADLEMAN, Len. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM; 1978; 21.2: 120-126.
[6] William Stallings, Network Security Essentials Application and standards, 4th edition published by Prentice Hall.
[7] Van Tilborg, Henk C.A. (2000). Fundamentals of Cryptology.
[8] Bellare, Mihir. "Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements".
[9] Katz, Jon; Lindell, Y. (2007). Introduction to Modern Cryptography.
[10] Pelzl & Paar (2010). Understanding Cryptography. Berlin: Springer-Verlag.