SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1685
Email encryption using Tri-cryptosystem based on android
1 Surendra Seervi; 2 Prem Parmar; 3 Niraj Viadya; 4 Hari Rajai
4Assistant Professor
1-3B.E. Students
Department of ComputeEngineering,
K.C. College of Engineering & Management studies Research
Kopri, Thane (E)-400 603, India
Abstract—In the growing era of Digital Technology,
a common question arise from digital users whether
the digital Application is secure or not. Since the
application is designed on a language the attacker
always try to find new loop holes and has a result a
new type of criminal activities take place. Even best
encryption can be breached to corrupt the data, steal
information, Cyber fraud, etc. This paper focuses on
Email Security on Android Operating System by
implementing the Tri-cryptosystem which is a
combination of Symmetric cryptosystem, public key
cryptosystem and hash function.
Keywords– tri-cryptography, symmetric encryption,
asymmetric encryption, hash function, secure email
I. INTRODUCTION
A most popular internet service is e-mail. Email is way to
exchange text by using internet connection. Now almost
internet services can be enjoyed by using mobile devices
such as notebook, smart phone and tablet PC anywhere
and anytime. Purposely, or not, the usage of e-mail to
exchange information and collaborate, is not only limited
to public information, but also confidential information,
To certain parties which has a value of confidentiality so
that it needs some security controls.
By using mobile devices with internet connection, e-mail
services can be used widely by many people to exchange
information and collaborate, both for individual,
enterprise and government. One of the most popular
Operating System is Android.
In order to prove safety of email sent from Android smart
phone, encryption and decryption process have to be
installed in an client side. All security systems use
cryptographic because it suggest several algorithms and
techniques practically unavailable to break because of
their entanglement.
II. TRI-CRYPTOSYSTEM SYSTEM
Symmetric and asymmetric ciphers each have their own
merits and demerits. Symmetric ciphers are faster than
asymmetric ciphers, but require all parties to somehow
share a secret key. But at the cost of speed asymmetric
algorithms allow public key infrastructures and key
exchange systems [4].
A Tri-cryptosystem is a protocol using multiple ciphers of
different types together, each to its best merits. One
common approach is to generate a random secret key for
a symmetric cipher, and then encrypt this key via an
asymmetric cipher using the recipient’s public key. The
message itself is then encrypted using the symmetric
cipher and the private key. Both the encrypted secret key
and the encrypted message are then sent to the recipient.
The recipient decrypt the secret key first, using his/her
own private key, and then uses that key to decrypt the
message.
A. SYMMETRIC CRYPTOGRAPHY
An encryption system in which the sender and receiver
uses a single, common key that is used to encrypt and
decrypt the message. In contrast with public key
cryptography, this utilizes two keys - a public key to
encrypt messages and a private key to decrypt message.
Symmetric-key systems are simpler and faster, but the
main drawback is that the two parties somehow exchange
the key in a secure way.
B.ASYMMETRIC CRYPTOGRAPHY
Asymmetric cryptography is also known as public key
cryptography, uses public and private keys for encryption
and decryption of the data. The keys are simply large
numbers that have been paired together but are not
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1686
similar(asymmetric). One key in the pair can be shared
with the parties; it is called the public key. The other key
in the pair is kept secret; it is called the private key. Either
of the keys can be used to encrypt a message; the other
key from the one used to encrypt the message is used for
decryption[3].
C. Hash function
the process of transforming input message m into a fixed
size string (called a hash value h) is called as hash
function and it is denoted by H.here h is the output of
hashing function applied on input message m.
h=H(m).hash function protect the integrity of the
message .if attacker tries to modify the original message
then the content of original message may changed it can
be identified by applying hashing algorithm.
III EXISTING SYSTEM
In existing system by using mobile devices with internet
connection, email services can be widely used by many
people to exchange information and collaborate, both for
individual, enterprise and government. One of the most
popular Operating System is Android. In order to prove
safety of email sent from Android smart phone,
encryption and decryption process have to be installed
in an client side. All security systems use cryptographic
because it suggests several algorithms and techniques
practically unavailable to break because of their
entanglement
Limitation of existing system:
 More processing time
 Message digest length is
more
 Less security
IV.PROPOSED SYSTEM
In this proposed design methodology, the new
protocol design using Symmetric cipher (Ping Pong-128)
and
public key cryptography (RSA) with hash function MD5.
This kind of cryptography uses a single key for both
encryption and decryption, and it is also called secret key
cryptography. The key is a set of rules, and both the
sender and the receiver must know the key in order to
use the technique. The most commonly known secret key
cryptography schemes are stream ciphers and block
ciphers[1]. The stream ciphers generate a sequence of
bits used as a key called a key stream, and the encryption
is achieve by combining the key stream with the plaintext.
This is usually done with the bitwise XOR operation. The
key stream can be independent of the plaintext and
cipher text, in which the stream cipher is synchronous, or
it can depend on the data and its encryption, in which the
stream cipher is self- synchronizing[2]. The public key
cryptographic algorithms are more secure then
symmetric algorithms. Because, it has two keys one for
encryption and another one for decryption. In this tri-
encryption technique we propose symmetric encryption
for encryption and decryption and using public key
cryptosystems for authentication A hash function offers a
way of creating afixed-size blocks of data by using entry
data with variable length and the exit data are known as
message digest or one-way encryption. . The hash values
solve the problem of the integrity of the messages.
Fig: encryption process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1687
Fig: decryption process
For email encryption various algorithm is required:
4.1 Ping Pong
The advantage of a stream cipher is faster and much more
efficient than block ciphers. PingPong-128 is a member of
the Ping-Pong family key-stream generator which uses
LFSR A (La) and LFSR B (Lb) of size 127 and 129 bits
respectively and has a key size of 128 bits. These 128 bits
of key and an initial vector of 128 bits are combined to fill
up the 256 bits internal state. The Ping-Pong generator
produces the output key stream by combining the LFSR
sequences and the memory sequence [5] .
PingPong-128 uses two primitive polynomials, Pa(x)
and Pb(x) which are given below
PA(X)=X127⊕ X109⊕ X91⊕ X84⊕ X73⊕ X6⊕ X66⊕
X63⊕ X56⊕ X55⊕ X52⊕ X48⊕ X45⊕ X42⊕ X41⊕
X37⊕ X34⊕ X30⊕ X27⊕ X23⊕ X21⊕ X20⊕ X19⊕
X16⊕ X13⊕ X12⊕ X7⊕ X6⊕ X2⊕ X1⊕ 1
Pb(x)=x129⊕ x125⊕ x121⊕ x117⊕ x113⊕ x109⊕
x105⊕ x101⊕ x97⊕ x93⊕ x89⊕ x85⊕ x81⊕ x77⊕
x73⊕ x69⊕x65⊕ x61⊕ x57⊕ x49⊕ x45⊕ x41⊕
x37⊕ x33⊕ x29⊕ x25⊕ x21⊕ x17⊕ x13⊕ x9⊕ x5⊕
1
The feedback connection of LFSR A (La) and LFSR B (Lb)
is determined by the primitive polynomials, Pa(x) and
Pb(x) respectively. Since primitive polynomial is used for
the feedback connection, both of the LFSRs generate
maximal length sequence. LFSR A (La) has a period of
2^127-1 and LFSR B (Lb) has a period of 2^129 - 1.
4.2RSA
RSA is a block cipher which convert plain text into
cipher text at sender side and vice versa at receiver side
.The security of RSA is considered to be factoring. RSA
computation occurs with integers modulo n = a * b, for
two random secret primes a, b. To encrypt a message m,
public key use a public key exponent e. so cipher text c =
me (mod n) computes the multiplicative reverse of d = e-
1 (mod (a-1)*(b-1)) (we require that e is selected suitably
for it to exist) and obtains cd = m e * d = m (mod n)[4].
The problem for the attacker is that computing the
reverse d of e is assumed to be no easier than factorizing
n. The key size should not be less than 1024 bits for a
reasonable level of security.
Digital signature employ asymmetric cryptography. In
many instances they provide a layer of validation and
security to messages sent through not secure channel:
Properly implemented, a digital signature gives the
receiver proof or feedback to believe the message was
sent by the claimed sender. To create RSA signature keys,
generate an RSA key pair containing a modulus N that is
the product of two large primes, along with e and d such
that ed=1 (mod φ (n)) ofN and e, and the signer's secret
key contains d.
To sign a message m, the signer computes σ ≡ md (mod
N). To verify, the receiver check that σe ≡ m (mod N).
As noted earlier, this basic scheme is not very secure. To
prevent attacks, one can first apply a cryptographic hash
function to the message m and then apply the RSA
algorithm described above to the result[6].
4.3.MD5
MD5 is a one way hash function, means it takes a
message of arbitrary length and converts it into a fixed
string of digits which is called as message digest.
When using a one way hash function, one can compare
the message digest that is decrypted with a public key
against the calculated message digest to verify that the
message has not been tampered .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1688
Conclusion
Most of us use smart phone, tablet and computer all day
long without realizing it. So, we need to realize the
encryption for application of smart phone/Android OS.
Tri-cryptosystem makes use of two different
cryptographic algorithm. Which removes the drawback
of use of any single cryptographic algorithm and provide
double security to secret data? It removes key
distribution problem. It’s strengths are respectively
defined as speed and security. Therefore, we are
suggesting the design of tri-cryptographic for secure
email based on Android OS.
Acknowledgment
This work is a part of graduation project done by
students of computer engineering. We thank everyone
who supported and motivated us. And special thanks to
our guide Mr. hari Rajai.
[1] William Stallings (2003), Cryptography and
Network Security-Principles and Practices, 3rd
Edition, Pearson Education Asia
[2] Menezes AJ, Oorschot PC, Vanstone SA. Handbook of
Applied Cryptography. Florida: CRC PressInc. 1996.
[3] Ramaraj E, Karthikeyan S, Hemalatha M. A Design of
Security Protocol using Hybrid Encryption
Technique (AES- Rijndael and RSA). International
Journal of The Computer, the Internet and
Management. 2009; 17(1):78-86
[4] Prof.PatrickMcDaniel,NetworkandSecurityResearch
CenterDepartmentofComputerScienceandEngineeri
ngPennsylvaniaState University, UniversityPark PA
– “Public-Key Cryptography andAttacks on RSA”,
2010
[5] Prof.HoonJae Lee, Kevin Chen, 2007 International
Conference on Convergence Information Technology
“PingPong-128, A New Stream Cipher for Ubiquitous
Application”
[6] https://en.wikipedia.org/wiki/Digital_signature.

More Related Content

What's hot (20)

Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Unit 5
Unit 5Unit 5
Unit 5
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Pgp
PgpPgp
Pgp
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Pgp
PgpPgp
Pgp
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 

Similar to Email Encryption using Tri-Cryptosystem Based on Android

ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 

Similar to Email Encryption using Tri-Cryptosystem Based on Android (20)

ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

Email Encryption using Tri-Cryptosystem Based on Android

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1685 Email encryption using Tri-cryptosystem based on android 1 Surendra Seervi; 2 Prem Parmar; 3 Niraj Viadya; 4 Hari Rajai 4Assistant Professor 1-3B.E. Students Department of ComputeEngineering, K.C. College of Engineering & Management studies Research Kopri, Thane (E)-400 603, India Abstract—In the growing era of Digital Technology, a common question arise from digital users whether the digital Application is secure or not. Since the application is designed on a language the attacker always try to find new loop holes and has a result a new type of criminal activities take place. Even best encryption can be breached to corrupt the data, steal information, Cyber fraud, etc. This paper focuses on Email Security on Android Operating System by implementing the Tri-cryptosystem which is a combination of Symmetric cryptosystem, public key cryptosystem and hash function. Keywords– tri-cryptography, symmetric encryption, asymmetric encryption, hash function, secure email I. INTRODUCTION A most popular internet service is e-mail. Email is way to exchange text by using internet connection. Now almost internet services can be enjoyed by using mobile devices such as notebook, smart phone and tablet PC anywhere and anytime. Purposely, or not, the usage of e-mail to exchange information and collaborate, is not only limited to public information, but also confidential information, To certain parties which has a value of confidentiality so that it needs some security controls. By using mobile devices with internet connection, e-mail services can be used widely by many people to exchange information and collaborate, both for individual, enterprise and government. One of the most popular Operating System is Android. In order to prove safety of email sent from Android smart phone, encryption and decryption process have to be installed in an client side. All security systems use cryptographic because it suggest several algorithms and techniques practically unavailable to break because of their entanglement. II. TRI-CRYPTOSYSTEM SYSTEM Symmetric and asymmetric ciphers each have their own merits and demerits. Symmetric ciphers are faster than asymmetric ciphers, but require all parties to somehow share a secret key. But at the cost of speed asymmetric algorithms allow public key infrastructures and key exchange systems [4]. A Tri-cryptosystem is a protocol using multiple ciphers of different types together, each to its best merits. One common approach is to generate a random secret key for a symmetric cipher, and then encrypt this key via an asymmetric cipher using the recipient’s public key. The message itself is then encrypted using the symmetric cipher and the private key. Both the encrypted secret key and the encrypted message are then sent to the recipient. The recipient decrypt the secret key first, using his/her own private key, and then uses that key to decrypt the message. A. SYMMETRIC CRYPTOGRAPHY An encryption system in which the sender and receiver uses a single, common key that is used to encrypt and decrypt the message. In contrast with public key cryptography, this utilizes two keys - a public key to encrypt messages and a private key to decrypt message. Symmetric-key systems are simpler and faster, but the main drawback is that the two parties somehow exchange the key in a secure way. B.ASYMMETRIC CRYPTOGRAPHY Asymmetric cryptography is also known as public key cryptography, uses public and private keys for encryption and decryption of the data. The keys are simply large numbers that have been paired together but are not
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1686 similar(asymmetric). One key in the pair can be shared with the parties; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the other key from the one used to encrypt the message is used for decryption[3]. C. Hash function the process of transforming input message m into a fixed size string (called a hash value h) is called as hash function and it is denoted by H.here h is the output of hashing function applied on input message m. h=H(m).hash function protect the integrity of the message .if attacker tries to modify the original message then the content of original message may changed it can be identified by applying hashing algorithm. III EXISTING SYSTEM In existing system by using mobile devices with internet connection, email services can be widely used by many people to exchange information and collaborate, both for individual, enterprise and government. One of the most popular Operating System is Android. In order to prove safety of email sent from Android smart phone, encryption and decryption process have to be installed in an client side. All security systems use cryptographic because it suggests several algorithms and techniques practically unavailable to break because of their entanglement Limitation of existing system:  More processing time  Message digest length is more  Less security IV.PROPOSED SYSTEM In this proposed design methodology, the new protocol design using Symmetric cipher (Ping Pong-128) and public key cryptography (RSA) with hash function MD5. This kind of cryptography uses a single key for both encryption and decryption, and it is also called secret key cryptography. The key is a set of rules, and both the sender and the receiver must know the key in order to use the technique. The most commonly known secret key cryptography schemes are stream ciphers and block ciphers[1]. The stream ciphers generate a sequence of bits used as a key called a key stream, and the encryption is achieve by combining the key stream with the plaintext. This is usually done with the bitwise XOR operation. The key stream can be independent of the plaintext and cipher text, in which the stream cipher is synchronous, or it can depend on the data and its encryption, in which the stream cipher is self- synchronizing[2]. The public key cryptographic algorithms are more secure then symmetric algorithms. Because, it has two keys one for encryption and another one for decryption. In this tri- encryption technique we propose symmetric encryption for encryption and decryption and using public key cryptosystems for authentication A hash function offers a way of creating afixed-size blocks of data by using entry data with variable length and the exit data are known as message digest or one-way encryption. . The hash values solve the problem of the integrity of the messages. Fig: encryption process
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1687 Fig: decryption process For email encryption various algorithm is required: 4.1 Ping Pong The advantage of a stream cipher is faster and much more efficient than block ciphers. PingPong-128 is a member of the Ping-Pong family key-stream generator which uses LFSR A (La) and LFSR B (Lb) of size 127 and 129 bits respectively and has a key size of 128 bits. These 128 bits of key and an initial vector of 128 bits are combined to fill up the 256 bits internal state. The Ping-Pong generator produces the output key stream by combining the LFSR sequences and the memory sequence [5] . PingPong-128 uses two primitive polynomials, Pa(x) and Pb(x) which are given below PA(X)=X127⊕ X109⊕ X91⊕ X84⊕ X73⊕ X6⊕ X66⊕ X63⊕ X56⊕ X55⊕ X52⊕ X48⊕ X45⊕ X42⊕ X41⊕ X37⊕ X34⊕ X30⊕ X27⊕ X23⊕ X21⊕ X20⊕ X19⊕ X16⊕ X13⊕ X12⊕ X7⊕ X6⊕ X2⊕ X1⊕ 1 Pb(x)=x129⊕ x125⊕ x121⊕ x117⊕ x113⊕ x109⊕ x105⊕ x101⊕ x97⊕ x93⊕ x89⊕ x85⊕ x81⊕ x77⊕ x73⊕ x69⊕x65⊕ x61⊕ x57⊕ x49⊕ x45⊕ x41⊕ x37⊕ x33⊕ x29⊕ x25⊕ x21⊕ x17⊕ x13⊕ x9⊕ x5⊕ 1 The feedback connection of LFSR A (La) and LFSR B (Lb) is determined by the primitive polynomials, Pa(x) and Pb(x) respectively. Since primitive polynomial is used for the feedback connection, both of the LFSRs generate maximal length sequence. LFSR A (La) has a period of 2^127-1 and LFSR B (Lb) has a period of 2^129 - 1. 4.2RSA RSA is a block cipher which convert plain text into cipher text at sender side and vice versa at receiver side .The security of RSA is considered to be factoring. RSA computation occurs with integers modulo n = a * b, for two random secret primes a, b. To encrypt a message m, public key use a public key exponent e. so cipher text c = me (mod n) computes the multiplicative reverse of d = e- 1 (mod (a-1)*(b-1)) (we require that e is selected suitably for it to exist) and obtains cd = m e * d = m (mod n)[4]. The problem for the attacker is that computing the reverse d of e is assumed to be no easier than factorizing n. The key size should not be less than 1024 bits for a reasonable level of security. Digital signature employ asymmetric cryptography. In many instances they provide a layer of validation and security to messages sent through not secure channel: Properly implemented, a digital signature gives the receiver proof or feedback to believe the message was sent by the claimed sender. To create RSA signature keys, generate an RSA key pair containing a modulus N that is the product of two large primes, along with e and d such that ed=1 (mod φ (n)) ofN and e, and the signer's secret key contains d. To sign a message m, the signer computes σ ≡ md (mod N). To verify, the receiver check that σe ≡ m (mod N). As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result[6]. 4.3.MD5 MD5 is a one way hash function, means it takes a message of arbitrary length and converts it into a fixed string of digits which is called as message digest. When using a one way hash function, one can compare the message digest that is decrypted with a public key against the calculated message digest to verify that the message has not been tampered .
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1688 Conclusion Most of us use smart phone, tablet and computer all day long without realizing it. So, we need to realize the encryption for application of smart phone/Android OS. Tri-cryptosystem makes use of two different cryptographic algorithm. Which removes the drawback of use of any single cryptographic algorithm and provide double security to secret data? It removes key distribution problem. It’s strengths are respectively defined as speed and security. Therefore, we are suggesting the design of tri-cryptographic for secure email based on Android OS. Acknowledgment This work is a part of graduation project done by students of computer engineering. We thank everyone who supported and motivated us. And special thanks to our guide Mr. hari Rajai. [1] William Stallings (2003), Cryptography and Network Security-Principles and Practices, 3rd Edition, Pearson Education Asia [2] Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. Florida: CRC PressInc. 1996. [3] Ramaraj E, Karthikeyan S, Hemalatha M. A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA). International Journal of The Computer, the Internet and Management. 2009; 17(1):78-86 [4] Prof.PatrickMcDaniel,NetworkandSecurityResearch CenterDepartmentofComputerScienceandEngineeri ngPennsylvaniaState University, UniversityPark PA – “Public-Key Cryptography andAttacks on RSA”, 2010 [5] Prof.HoonJae Lee, Kevin Chen, 2007 International Conference on Convergence Information Technology “PingPong-128, A New Stream Cipher for Ubiquitous Application” [6] https://en.wikipedia.org/wiki/Digital_signature.