Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
Messages sent using the default Short Message Service (SMS) application have to pass the SMS Center (SMSC) to record the communication between the sender and recipient. Therefore, the message security is not guaranteed because it may read by irresponsible people. This research proposes the RC4 stream cipher method for security in sending SMS. However, RC4 has any limitation in the Key Scheduling Algorithm (KSA) and Pseudo Random Generation Algorithm (PRGA) phases. Therefore, this research developed RC4 with a random initial state to increase the randomness level of the keystream. This SMS cryptography method applied the processes of encryption against the sent SMS followed by decryption against the received SMS. The performance of the proposed method is evaluated based on the time of encryption and decryption as well as the average correlation value. Based on the time, it shows that the length of the SMS characters sent affects the time of encryption and decryption. Meanwhile, the best correlation value achieved 0.00482.
Authors and Affiliations
Rifki Rifki, Anindita Septiarini, Heliza Rahmania Hatta
Intelligent Transportation System (ITS) for Smart-Cities using Mamdani Fuzzy Inference System
It is estimated that more than half of the world population lives in cities according to (UN forecasts, 2014), so cities are vital. Cities, as we all know facing with complex challenges – for smart cities the outdated tr...
Collaborative Learning Skills in Multi-touch Tables for UML Software Design
The use of Multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This pa...
A Hybrid Genetic Algorithm with Tabu Search for Optimization of the Traveling Thief Problem
Until now, several approaches such as evolutionary computing and heuristic methods have been presented to optimize the traveling thief problem (TTP). However, most of these approaches consider the TTP components independ...
Using Space Syntax and Information Visualization for Spatial Behavior Analysis and Simulation
This study used space syntax to discuss user movement dynamics and crowded hot spots in a commercial area. Moreover, it developed personas according to its onsite observations, visualized user movement data, and performe...
Detecting Public Sentiment of Medicine by Mining Twitter Data
The paper presents a computational method that mines, processes and analyzes Twitter data for detecting public sentiment of medicine. Self-reported patient data are collected over a period of three months by mining the T...