SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 797
Triple layered Security on Android based SMS transaction
Tamal Biswas
1Department of Computer Science and Engineering, National Institute of Technology,
Agartala 799046, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—In this paper, the authors haveproposedatriple
layer encryption technique for Short Message Service (SMS),
which is secure, fast, and data is encrypted strongly. SMS is a
very popular way for mobile phone and portable device users
to send and receive simple text messages. Unfortunately, SMS
does not offer a secure environment for confidential data
during transmission. The proposed more secured and
advanced SMS encryption technique on android application
has some stages. In first stage, SMS or any image is converted
to byte and then it is converted to hexadecimal number and
some bit manipulation is done. In the second step, a mapping
table is used to convert each hex digit to alphabet using a
predefined conversion table and then hill cipher is applied.
Finally, AES encryption is used to ensure the algorithm is
secure and non-vulnerable. The proposed algorithm primarily
designed for android SMS transaction can beused forimageor
message containing any alphanumeric or special characters.
Keyword — Advance Encryption Techniques, hill
cipher, android application, SMS.
1. Introduction:
In present day scenario, data security is the major issue for
sending data from one end to another. There are lots of
method to use the data to make it more secure but still all
these are vulnerable. For this reason, it is very essential that
the data cannot be intercepted or misused byanymeans.For
example, we can assume a situation where an investigation
agency is sending some important data to another agency,
then they should need to make the data more secure that no
one else can be able to break the encrypted data in the open
network or we can also assume a situation where a military
person wants to send some important message to another
higher authority. In this situation if any intruder attacks it
then it can be highly devastating and can cause much more
destruction. Different encryption methods are used by
different organization and different government institutes.
The basic cryptography is classified into two types:
1. Symmetric key
2. Asymmetric key
Symmetric key cryptography uses only one key for
encryption as well as decryption purpose. It is easy to deal
with symmetric key system as there we need only a single
key but here too many keys will be required for decryption
which is a tough job. On the other hand, public key crypto
system is also very popular and secure where for encryption
it needs the receiver’s public key which is known to all and
for decryption it needs the receiver’s private key which is
kept secured.
In our proposed method, we combined two different
algorithm in an advanced way and it is more secured and
robust since we used advanced hill cipher technique, as we
know hill cipher is a polygraphed substitution based on
linear algebra where letter is represented by number mod
26. For encryption of message, each block of n letter is
multiplied by an invertible n*n key matrix and then mod 26
is applied. To decrypt the message, each block is multiplied
by the inverse of the key matrix. Another technique we used
in our algorithm is AES method. AES is advance encryption
standard for the encryption of electronic data. It is based on
substitution and permutation method where it combines
both substitution and permutation and the message is
divided into fixed block of 128 bit and key size is of 128,192
or 256 bit. In our method, both data and image can be
encrypted using bit manipulation in a more robust way.
2. Related work
The different encryption modules which made up the
Image Encryption System cryptographic methods are as
follows:
Modified Bits Rotation and Reversal Technique: In this
technique, a password is supplied along withaninputimage.
Equivalent eight bit binary number isobtainedbyconverting
the value of each pixel of input image. Then the ASCII Value
of each byte of the password is added and a number is
generated from the password which is used for the Bits
Rotation and Reversal technique. Finally, this generated
number is modular operated by 7 to generate the effective
number (NR), according to which the bitswill berotatedand
reversed. Since, the value of each pixel denotes its color;
change that takes place in the value of each pixel of input
image due to modified Bits Rotation & Reversal producesthe
encrypted image.
Extended Hill Cipher Technique: An involutory matrix is
generated using the algorithm presented in [3]. The
algorithm is a involutory matrix of dimensions m x m built
using the password supplied as input. Index value of each
row of input image is converted into x-bit binary number,
where x is number of bits present in binary equivalent of
index value of last row of input image. The resultant x-bit
binary number is rearranged in reverse order. This
reversed-x-bit binary number is converted into its
equivalent decimal number. Therefore value of index value
of each row changes and hence position of all rows of input
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 798
image changes. i.e., Positions of all the rows of input image
are rearranged in Bits-Reversed-Order. Similarly, positions
of all columns of input image are also rearranged in Bits-
Reversed-Order. Final encrypted image is obtained by
applying Hill Cipher technique onthePositionalManipulated
image generated from Step 2.
3. General Approach of Triple Layered Encryption
TheTriple Layered Encryptionis a processto encryptthe
data multiple times using the same algorithm or different
algorithms.This technique is widely useddue to itsfeatureof
enhanced security for data communication over the
vulnerable wireless network as the Internet. The concept of
multiple encryptions can be described as a technique to
provide multilayer and multi-level security over unreliable
wireless network. This technique can beunderstoodthrough
a real life example, where we are keeping our precious item
within a box and this boxis kept in another boxandfinallywe
kept in alocker and lockit with a key. Here, we areprotecting
our precious item through multilayer andmultilevelsecurity.
If anyone wants to achieve this precious item he/she has to
cross all boundaries. First, he has to unlock the locker with
the key, and then he has to open the box to get the inner one.
In the same manner, lots of time and efforts are required to
achieve the original message if it is encrypted by multiple
encryptions.
3.1. Working Criteria of Multiple Encryption
In modern cryptography, by encrypting the data and
information thrice, with different algorithms, we would
anticipate the resultant encryption to be stronger in all but
some special conditions with better level of security.
The encryptionoperationof triplelayeredencryptioncan
be described as:
Cipher text = {(Encrypt_with AES (Encrypt_withHILLCipher
(Bit Manipulation)))}
Plain text = {(Decrypt_with AES (Decrypt_with HILL
Cipher (Bit Manipulation)))}
3.2. Proposed algorithm
Algorithm-1: User interface for sending and receiving SMS
3.3. Algorithm-2: internal structure of triple
layered security on android basedSMStransaction.
Fig : Process Flowchart
Encryption Decryption
1. Take plain text/image
as SMS.
2. Calculate the length of
SMS ->L
3. If L>Max. length of SMS
4. Divide SMS
5. Take each part of the
message and convert into
binary digits.
6. Apply bit manipulation
i.e. bit rotation and shifting
technique.
7. Convert the digits into
hexadecimal.
8. Convert the
hexadecimal using
substitution table.
9. Apply hill cipher.
10. Finally apply AES.
11. Enter16 bit secret
key.
11. Send the cipher text
1. Receive the cipher
text.
2. Enter the 16 digit
key
3. If(key=true)
4. Decrypt the
message with AES
5. Decrypt the
message using hill cipher
6. Convert the
alphabet into hexadecimal
using substitution table.
7.Convert it into
binary digits
8.Apply bit
manipulation i.e. bit
rotation and shifting
technique
9.Finally receive the
plain text
10.Else
11.Re-enter the key.
Encryption Decryption
1) Write SMS
2) Provide the SMS
recipient
number
3) Give the 16 bit
secret number
4) Encrypt the
message AES
5) Send the SMS
1) Get SMS.
2) Authenticate using
16 bit secret key.
3) If(key=true)
4) Decrypt the message
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 799
The flowchart shows when a sender wants to send the SMS
using triple layered security application, he/she needs to
provide a 16 bit symmetric code and receiver’s number; the
SMS is then sent in encrypted format. Also the SMS is stored
in encrypted form at both the sender and receiver ends.
When the receiver first receives the SMS, he/she needs to
authenticate himself/herself using 16 bit secret code, then
only he/she can decrypt the SMS.
(a)
(b)
(c)
(d)
Fig: screenshots of Triple layered Security; (a) sending the
encrypted SMS ; (b) ) Receiving the encrypted SMS (c)
Decryption of the SMS using by authenticating 16bitkey;(d)
Display of messages in encrypted form.
The screen shots shown above are taken from the
application. The length of the SMS should be less than 32
bits. As the encrypted SMS generated is of 140 bit, so
message greater than 140 bit cannot be send at once.
4. Conclusions and Future Research Directions:
In this paper, we are proposing unique idea which issuitable
for the IT environment from the customer point of view.Due
to flexibility, application provides quality of service
“Anytime”, “Anywhere”, “And Anyplace”. This application is
made to improve data security by encrypting the text, by
merging encryption methods such as bit manipulation, Hill
Cipher and AES Cipher has further strengthened data
security.
5. REFERENCES
[1] S. Ariffin, R. Mahmod, A. Jaafar and M.R.K. Ariffin, “Byte
Permutations in Block Cipher Based on Immune
Systems”, International Conference on Software
Technology and Engineering, 3rd (ICSTE 2011). ASME
Press, New York, NY. , 2011.
[2] R.K. Balan, N. Ramasubbum, K. Prakobphol, N. Christin,
and J. Hong, “mFerio: The Design and Evaluation of a
Peer-to-Peer Mobile PaymentSystem”, MobiSys ‘09,
2009.
[3] ashpal Mote, Paritosh Nehete, Shekhar Gaikwad,
"Superior Security Data Encryption Algorithm (NTRU)",
International Journal of Engineering Sciences ISSN:
2229-6913 Issue July 2012, Vol. 6.
[4] Prof. Avinash Wadhe, Miss NamrataA.Sable,"MobileSMS
Banking Security Using Elliptic Curve Cryptosystem In
Binary Field",International Journal of Engineering
Research and Applications (IJERA), Vol. 3, Issue 3, May-
Jun 2013.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 800
[5] Tarek M. Mahmoud, Bahgat A. Abdel-latef, Awny A. Ah-
med,” Hybrid Compression Encryption Technique for
Secur-ing SMS”, IJCSS), Volume (3): Issue (6).
[6] Vishal Pachori, Gunjan Ansari, Neha Chaudhary-
“Improved Performance of Advance Encryption
Standard using Parallel Computing” International
Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue
1,Jan-Feb 2012, pp.967-971
[7] Tehrani M.A., Amidian AS., Muhammadi 1., and Rabiee
H.R., "A survey of system platformsformobilepayment",
The 4th international conference on data management
on E-commerce and E-Government (ICMECG),2010.
[8] Gandharba Swain1 and Saroj Kumar Lenka2,“LSBArray
Based Image Steganography TechniquebyExploringthe
Four Least Significant Bits”, Springer-Verlag Berlin
Heidelberg , Part II, CCIS 270, pp, 479–488, 2012.
[9] Tzung-Her Chen and Chang-Sian Wu, “Efficient multi-
secret image sharing based on Boolean operations”.
Signal Processing 91(2011) 90-97.
[10] Li B., He, J. Huang, J.She, Y.Q,“A Survey on Image
Steganography and Steganalysis” JournalofInformation
hiding and Multimedia Signal Processing 2(2), pp,142–
172 2011.
[11] Bibhudendra Acharya et al. “Image Encryption Using
Advanced Hill Cipher Algorithm”. International Journal
of Recent Trends in Engineering, Vol.1, No.1, May 2009,
pp.663-667.
[12] Bibhudendra Acharya et al. “Involutory, Permuted and
Reiterative key Matrix generation Methods for Hill
Cipher System”. International Journal of Recent Trends
in Engineering, Vol.1, No.4, May 2009, pp.106-108.
[13] Amanpreet Kaur, Renu Dhir, and Geeta Sikka , “A New
Image Steganography Based On First Component
Alteration Technique”, (IJCSIS) International Journal of
Computer Science and Information Security, Vol. 6, No.
3,pp,53-56 ,2009.
[14] Debnath, D. ; Deb, S. ; Kar, N., “An Advanced Image
Encryption Standard Providing Dual Security:
Encryption Using Hill Cipher & RGB Image
Steganography” ,Computational Intelligence and
Networks (CINE), 2015
[15] Panduranga, H.T. ; Sharath Kumar, H.S. ; Naveen Kumar,
S.K., “Hybrid approach for dual image encryption using
nibble exchange and Hill-cipher “, Machine Vision and
Image Processing (MVIP), 2012 .
[16] Gupta, S. ; Sengupta, S. ; Bhattacharyya, M. ; Chattrejee,
S. ; Sharma, B.S., “Cellular phone based web
authentication system using 3-D encryption technique
under stochastic framework” ,Internet, 2009. AH-ICI

More Related Content

What's hot

Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)IJERA Editor
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionSecure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionCSCJournals
 
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption TechniqueCryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption Techniqueijtsrd
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for SnagsIRJET Journal
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a revieweSAT Journals
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 

What's hot (19)

Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionSecure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
 
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption TechniqueCryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a review
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 

Similar to IRJET-Triple Layered Security on Android Based SMS Transaction

IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionBRNSSPublicationHubI
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationIRJET Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingTELKOMNIKA JOURNAL
 

Similar to IRJET-Triple Layered Security on Android Based SMS Transaction (20)

D018141922
D018141922D018141922
D018141922
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decoding
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

IRJET-Triple Layered Security on Android Based SMS Transaction

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 797 Triple layered Security on Android based SMS transaction Tamal Biswas 1Department of Computer Science and Engineering, National Institute of Technology, Agartala 799046, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract—In this paper, the authors haveproposedatriple layer encryption technique for Short Message Service (SMS), which is secure, fast, and data is encrypted strongly. SMS is a very popular way for mobile phone and portable device users to send and receive simple text messages. Unfortunately, SMS does not offer a secure environment for confidential data during transmission. The proposed more secured and advanced SMS encryption technique on android application has some stages. In first stage, SMS or any image is converted to byte and then it is converted to hexadecimal number and some bit manipulation is done. In the second step, a mapping table is used to convert each hex digit to alphabet using a predefined conversion table and then hill cipher is applied. Finally, AES encryption is used to ensure the algorithm is secure and non-vulnerable. The proposed algorithm primarily designed for android SMS transaction can beused forimageor message containing any alphanumeric or special characters. Keyword — Advance Encryption Techniques, hill cipher, android application, SMS. 1. Introduction: In present day scenario, data security is the major issue for sending data from one end to another. There are lots of method to use the data to make it more secure but still all these are vulnerable. For this reason, it is very essential that the data cannot be intercepted or misused byanymeans.For example, we can assume a situation where an investigation agency is sending some important data to another agency, then they should need to make the data more secure that no one else can be able to break the encrypted data in the open network or we can also assume a situation where a military person wants to send some important message to another higher authority. In this situation if any intruder attacks it then it can be highly devastating and can cause much more destruction. Different encryption methods are used by different organization and different government institutes. The basic cryptography is classified into two types: 1. Symmetric key 2. Asymmetric key Symmetric key cryptography uses only one key for encryption as well as decryption purpose. It is easy to deal with symmetric key system as there we need only a single key but here too many keys will be required for decryption which is a tough job. On the other hand, public key crypto system is also very popular and secure where for encryption it needs the receiver’s public key which is known to all and for decryption it needs the receiver’s private key which is kept secured. In our proposed method, we combined two different algorithm in an advanced way and it is more secured and robust since we used advanced hill cipher technique, as we know hill cipher is a polygraphed substitution based on linear algebra where letter is represented by number mod 26. For encryption of message, each block of n letter is multiplied by an invertible n*n key matrix and then mod 26 is applied. To decrypt the message, each block is multiplied by the inverse of the key matrix. Another technique we used in our algorithm is AES method. AES is advance encryption standard for the encryption of electronic data. It is based on substitution and permutation method where it combines both substitution and permutation and the message is divided into fixed block of 128 bit and key size is of 128,192 or 256 bit. In our method, both data and image can be encrypted using bit manipulation in a more robust way. 2. Related work The different encryption modules which made up the Image Encryption System cryptographic methods are as follows: Modified Bits Rotation and Reversal Technique: In this technique, a password is supplied along withaninputimage. Equivalent eight bit binary number isobtainedbyconverting the value of each pixel of input image. Then the ASCII Value of each byte of the password is added and a number is generated from the password which is used for the Bits Rotation and Reversal technique. Finally, this generated number is modular operated by 7 to generate the effective number (NR), according to which the bitswill berotatedand reversed. Since, the value of each pixel denotes its color; change that takes place in the value of each pixel of input image due to modified Bits Rotation & Reversal producesthe encrypted image. Extended Hill Cipher Technique: An involutory matrix is generated using the algorithm presented in [3]. The algorithm is a involutory matrix of dimensions m x m built using the password supplied as input. Index value of each row of input image is converted into x-bit binary number, where x is number of bits present in binary equivalent of index value of last row of input image. The resultant x-bit binary number is rearranged in reverse order. This reversed-x-bit binary number is converted into its equivalent decimal number. Therefore value of index value of each row changes and hence position of all rows of input
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 798 image changes. i.e., Positions of all the rows of input image are rearranged in Bits-Reversed-Order. Similarly, positions of all columns of input image are also rearranged in Bits- Reversed-Order. Final encrypted image is obtained by applying Hill Cipher technique onthePositionalManipulated image generated from Step 2. 3. General Approach of Triple Layered Encryption TheTriple Layered Encryptionis a processto encryptthe data multiple times using the same algorithm or different algorithms.This technique is widely useddue to itsfeatureof enhanced security for data communication over the vulnerable wireless network as the Internet. The concept of multiple encryptions can be described as a technique to provide multilayer and multi-level security over unreliable wireless network. This technique can beunderstoodthrough a real life example, where we are keeping our precious item within a box and this boxis kept in another boxandfinallywe kept in alocker and lockit with a key. Here, we areprotecting our precious item through multilayer andmultilevelsecurity. If anyone wants to achieve this precious item he/she has to cross all boundaries. First, he has to unlock the locker with the key, and then he has to open the box to get the inner one. In the same manner, lots of time and efforts are required to achieve the original message if it is encrypted by multiple encryptions. 3.1. Working Criteria of Multiple Encryption In modern cryptography, by encrypting the data and information thrice, with different algorithms, we would anticipate the resultant encryption to be stronger in all but some special conditions with better level of security. The encryptionoperationof triplelayeredencryptioncan be described as: Cipher text = {(Encrypt_with AES (Encrypt_withHILLCipher (Bit Manipulation)))} Plain text = {(Decrypt_with AES (Decrypt_with HILL Cipher (Bit Manipulation)))} 3.2. Proposed algorithm Algorithm-1: User interface for sending and receiving SMS 3.3. Algorithm-2: internal structure of triple layered security on android basedSMStransaction. Fig : Process Flowchart Encryption Decryption 1. Take plain text/image as SMS. 2. Calculate the length of SMS ->L 3. If L>Max. length of SMS 4. Divide SMS 5. Take each part of the message and convert into binary digits. 6. Apply bit manipulation i.e. bit rotation and shifting technique. 7. Convert the digits into hexadecimal. 8. Convert the hexadecimal using substitution table. 9. Apply hill cipher. 10. Finally apply AES. 11. Enter16 bit secret key. 11. Send the cipher text 1. Receive the cipher text. 2. Enter the 16 digit key 3. If(key=true) 4. Decrypt the message with AES 5. Decrypt the message using hill cipher 6. Convert the alphabet into hexadecimal using substitution table. 7.Convert it into binary digits 8.Apply bit manipulation i.e. bit rotation and shifting technique 9.Finally receive the plain text 10.Else 11.Re-enter the key. Encryption Decryption 1) Write SMS 2) Provide the SMS recipient number 3) Give the 16 bit secret number 4) Encrypt the message AES 5) Send the SMS 1) Get SMS. 2) Authenticate using 16 bit secret key. 3) If(key=true) 4) Decrypt the message
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 799 The flowchart shows when a sender wants to send the SMS using triple layered security application, he/she needs to provide a 16 bit symmetric code and receiver’s number; the SMS is then sent in encrypted format. Also the SMS is stored in encrypted form at both the sender and receiver ends. When the receiver first receives the SMS, he/she needs to authenticate himself/herself using 16 bit secret code, then only he/she can decrypt the SMS. (a) (b) (c) (d) Fig: screenshots of Triple layered Security; (a) sending the encrypted SMS ; (b) ) Receiving the encrypted SMS (c) Decryption of the SMS using by authenticating 16bitkey;(d) Display of messages in encrypted form. The screen shots shown above are taken from the application. The length of the SMS should be less than 32 bits. As the encrypted SMS generated is of 140 bit, so message greater than 140 bit cannot be send at once. 4. Conclusions and Future Research Directions: In this paper, we are proposing unique idea which issuitable for the IT environment from the customer point of view.Due to flexibility, application provides quality of service “Anytime”, “Anywhere”, “And Anyplace”. This application is made to improve data security by encrypting the text, by merging encryption methods such as bit manipulation, Hill Cipher and AES Cipher has further strengthened data security. 5. REFERENCES [1] S. Ariffin, R. Mahmod, A. Jaafar and M.R.K. Ariffin, “Byte Permutations in Block Cipher Based on Immune Systems”, International Conference on Software Technology and Engineering, 3rd (ICSTE 2011). ASME Press, New York, NY. , 2011. [2] R.K. Balan, N. Ramasubbum, K. Prakobphol, N. Christin, and J. Hong, “mFerio: The Design and Evaluation of a Peer-to-Peer Mobile PaymentSystem”, MobiSys ‘09, 2009. [3] ashpal Mote, Paritosh Nehete, Shekhar Gaikwad, "Superior Security Data Encryption Algorithm (NTRU)", International Journal of Engineering Sciences ISSN: 2229-6913 Issue July 2012, Vol. 6. [4] Prof. Avinash Wadhe, Miss NamrataA.Sable,"MobileSMS Banking Security Using Elliptic Curve Cryptosystem In Binary Field",International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 3, May- Jun 2013.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 800 [5] Tarek M. Mahmoud, Bahgat A. Abdel-latef, Awny A. Ah- med,” Hybrid Compression Encryption Technique for Secur-ing SMS”, IJCSS), Volume (3): Issue (6). [6] Vishal Pachori, Gunjan Ansari, Neha Chaudhary- “Improved Performance of Advance Encryption Standard using Parallel Computing” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb 2012, pp.967-971 [7] Tehrani M.A., Amidian AS., Muhammadi 1., and Rabiee H.R., "A survey of system platformsformobilepayment", The 4th international conference on data management on E-commerce and E-Government (ICMECG),2010. [8] Gandharba Swain1 and Saroj Kumar Lenka2,“LSBArray Based Image Steganography TechniquebyExploringthe Four Least Significant Bits”, Springer-Verlag Berlin Heidelberg , Part II, CCIS 270, pp, 479–488, 2012. [9] Tzung-Her Chen and Chang-Sian Wu, “Efficient multi- secret image sharing based on Boolean operations”. Signal Processing 91(2011) 90-97. [10] Li B., He, J. Huang, J.She, Y.Q,“A Survey on Image Steganography and Steganalysis” JournalofInformation hiding and Multimedia Signal Processing 2(2), pp,142– 172 2011. [11] Bibhudendra Acharya et al. “Image Encryption Using Advanced Hill Cipher Algorithm”. International Journal of Recent Trends in Engineering, Vol.1, No.1, May 2009, pp.663-667. [12] Bibhudendra Acharya et al. “Involutory, Permuted and Reiterative key Matrix generation Methods for Hill Cipher System”. International Journal of Recent Trends in Engineering, Vol.1, No.4, May 2009, pp.106-108. [13] Amanpreet Kaur, Renu Dhir, and Geeta Sikka , “A New Image Steganography Based On First Component Alteration Technique”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3,pp,53-56 ,2009. [14] Debnath, D. ; Deb, S. ; Kar, N., “An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography” ,Computational Intelligence and Networks (CINE), 2015 [15] Panduranga, H.T. ; Sharath Kumar, H.S. ; Naveen Kumar, S.K., “Hybrid approach for dual image encryption using nibble exchange and Hill-cipher “, Machine Vision and Image Processing (MVIP), 2012 . [16] Gupta, S. ; Sengupta, S. ; Bhattacharyya, M. ; Chattrejee, S. ; Sharma, B.S., “Cellular phone based web authentication system using 3-D encryption technique under stochastic framework” ,Internet, 2009. AH-ICI