END TO END TRANSMISSION OF SMS USING CRYPTOGRAPHY TECHNIQUE
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
Short message service (SMS) is a very popular and one of the easy to use communication technologies for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. Short Message Service is normally used to transport unclassified data, but with the rise of mobile commerce it has become a fundamental tool for conducting business. However SMS does not guarantee confidentiality and integrity of the message. Now a days, short message service (SMS) is being us ed in many daily life applications, including mobile banking, mobile commerce, and so on. But when we send an SMS from one mobile device to another, the information contained in the SMS transmit as plain text. Sometimes this information may be confidential like account numbers, passwords, license numbers, and so on, and it is a major drawback to send such information through SMS while the traditional SMS service does not provide encryption to the information before its transmission. In this paper, we propos e an efficient and secure technique, which provides end - to - end secure communication through SMS between end users. This paper proposes encryption technique that can be used to secure a SMS communication, when SMS is transmitting form source to destination, it have to be reached up to the destination securely means SMS transmission have to be secure
Authors and Affiliations
Saurabh M. Chaudhari*, , Chetan Bawankar
Novel Fast Haar Wavelet Transform for Brain Image Compression Using Spiht Algorithm
A combination of image compression techniques has been extended to compress medical images. Due to the widespread usage of data about patients and medical images like CT and MR scan, these medical imagery needs t...
STUDY OF DIFFERENT ALGORITHMS USE FOR DISK SCHEDULING PROCESS
This paper aims to discuss the functioning of a disk and the comparative procedure involved in the retrieval of data on a direct access storage device by different algorithms. Efficiency of the different Disk Scheduling...
IDENTIFYING OPTIMAL NUMBER OF ORTHONORMALISATION IN LEARNING ALGORITHM USING WEATHER FORECASTING
Artificial neural networks are more powerful than any other traditional expert system in the classification of patterns, which are non linear and in performing pattern classification tasks because they learn f...
SQL INJECTION DETECTION AND PREVENTION USING HYBRID APPROACH
Web applications such as blogs, social network, webmail, bank etc have become our way of life. Among the top ten web application vulnerabilities published by Open Web Application Security Project, SQL Injection Attack (...
RETROFITTING AND STRENGTHENING OF BRIDGES
This paper presents one bridge which were either rehabilitated or strengthened by using FRP composites. The resulting structure was then tested for the effect after using FRP composites for Rehabilitation and stre...