Cryptography on Android Message Applications – A Review
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5
Abstract
Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Security of SMS’s is still an open challenging task. Various Cryptographic algorithms have been applied to secure the mobile SMS. The success of any cryptography technique depends on various factors like complexity, time, memory requirement, cost etc. In this paper we survey the most common and widely used SMS Encryption techniques. Each has its own advantages and disadvantages. Recent trends on Cryptography on android message applications have also been discussed. The latest cryptographic algorithm is based on lookup table and dynamic key which is easy to implement and to use and improve the efficiency. In this paper, an improvement in lookup table and dynamic algorithm is proposed. Rather than using the Static Lookup Table, Dynamic Lookup Table may be used which will improve the overall efficiency.
Authors and Affiliations
Nishika , Rahul Kumar Yadav
Classification of Breast cancer by comparing Back propagation training algorithms
Breast cancer diagnosis has been approached by various machine learning techniques for many years. This paper presents a study on classification of Breast cancer using Feed Forward Artificial Neural Networks. Back propag...
Meta-Content framework for back index generation
Book reading is a common thing which every one of us does in our life. A common strategy to spot a page for reading is to use front index and back index. A front index generally contains the sections and subsections topi...
A Secure Data Classification Model for achieving Data Confidentiality and Integrity in Cloud Environment
Cloud computing offers numerous benefits including scalability, availability and many services. It needs to address three main security issues: confidentiality, integrity and availability. It is on demand and pay per use...
An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining
The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research...
Classification of Different Species Families using Clustering lgorithm
The division of similar objects into groups is known as Clustering. The main objective of this implementation is classification of DNA sequences related to different species and their families using Clustering Algorithm...