Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
Messages sent using the default Short Message Service (SMS) application have to pass the SMS Center (SMSC) to record the communication between the sender and recipient. Therefore, the message security is not guaranteed because it may read by irresponsible people. This research proposes the RC4 stream cipher method for security in sending SMS. However, RC4 has any limitation in the Key Scheduling Algorithm (KSA) and Pseudo Random Generation Algorithm (PRGA) phases. Therefore, this research developed RC4 with a random initial state to increase the randomness level of the keystream. This SMS cryptography method applied the processes of encryption against the sent SMS followed by decryption against the received SMS. The performance of the proposed method is evaluated based on the time of encryption and decryption as well as the average correlation value. Based on the time, it shows that the length of the SMS characters sent affects the time of encryption and decryption. Meanwhile, the best correlation value achieved 0.00482.
Authors and Affiliations
Rifki Rifki, Anindita Septiarini, Heliza Rahmania Hatta
Comparative Study of Bayesian and Energy Detection Including MRC Under Fading Environment in Collaborative Cognitive Radio Network
The most important component of Cognitive Radio Network (CRN) is to sense the underutilised spectrum efficiently in fading environment for incorporating the increasing demand of wireless applications. The result of spect...
Current Trends and Research Challenges in Spectrum-Sensing for Cognitive Radios
The ever increasing demand of wireless communication systems has led to search of suitable spectrum bands for transmission of data. The research in the past has revealed that radio spectrum is under-utilized in most of t...
A DIY APPROACH TO UNI-TEMPORAL DATABASE IMPLEMENTATION
When historical versions of data are concerned for a MIS (Management Information System) we naturally might resort to temporal database products. These bi-temporal products, however, are often extravagant and not easily...
A Comparison of Near-Hidden and Information Asymmetry Interference Problems in Wireless Mesh Networks
Multi-radio Multi-channel (MRMC) Wireless Mesh Networks (WMNs) have made quick progress in current years to become the best option for end users due to its reliability and low cost. Although WMNs have already been used s...
Software Security Requirements Gathering Instrument
Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured soft...