SlideShare a Scribd company logo
IOSR Journal of Mobile Computing & Application (IOSR-JMCA)
e-ISSN: 2394-0050, P-ISSN: 2394-0042.Volume 3, Issue 4 (Jul. - Aug. 2016), PP 11-16
www.iosrjournals.org
DOI: 10.9790/0050-03041116 www.iosrjournals.org 11 | Page
Securing Short Message ServiceUsing Vernam Cipher in
Android Operating System
Andysah Putera Utama Siahaan
Faculty of Computer Science, Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract: Although many ways to communicate with someone, SMS is still one of the popular media to send a
message to someone. Not unlike the others, the messages sent can be known by the third party either tapping or
the investigation. Unencrypted SMS can be easily obtained from communication providers so that they may be
misused. Since the communication devices have been using Android operating system, they are programmable.
There is various script can be inserted to devices to protect the data. One of them is Vernam Cipher. This
method offers how to protect personal messages sent via SMS easily. It converts the message into an encrypted
message shortly before sent. At the moment there tapping on the outside, the information is not easily
understood its contents. The message is entirely secure.
Keywords: Vernam, Mobile, SMS, Cryptography, Security, Encryption, Decryption
I. Introduction
Information security means securing information systems from unauthorized access, use, disclosure,
disruption, modification, perusal, inspection, recording or destruction [7].Despite the emergence of digital media
to communicate, SMS is still used as a system that is popular among social media. SMS has a major role in
communication. Not everyone has a sophisticated device that supports internet facility. For owners of older
model devices, SMS is a way that always used to deliver the message to the listener. The security of data on
SMS delivery is not guaranteed. Everyone can steal the message. Although the message is personal, the message
can be retrieved from a provider. When there is an investigation, the message might be generated from the
database. Whatever happens at the talks, if everyone wants, the message is still readable. This method does not
teach how to send the crime message, but it explains how to keep a secret message is not misused by the
irresponsible parties. This research tries to modify the bits order by encrypting and providing a password.
II. Theories
2.1 Android Short Message Service
SMS stands for Short Message Service. It is a facility to send and receive a short text message via the
wireless devices or cellular phone communication device. One of the advantages of SMS is cost. SMS is a
service that is widely applied in wireless communication system. SMS enables sending messages in
alphanumeric. SMS mechanism is sending a short message from one subscriber terminal to another terminal.
Short Message Service Centre (SMSC) is the device that handles this operation. It is also known as Message
Centre (MC). It includes the determination of search or sorts the final destination of the message.Figure 1
illustrates how the GSM Network handles the SMS.
Figure 1.SMS Architecture
SMS service is a non-real time service where a short message can be submitted to a destination, no
matter if the destination is ready or not. When it is not active, the system will delay the delivery to the
destination until the destination is active again. The SMS system guarantees the delivery of a short message to
get to the destination. Temporary delivery failures always identified as a pending message. Short retransmission
Securing Short Message ServiceUsing Vernam Cipher in Android Operating System
DOI: 10.9790/0050-03041116 www.iosrjournals.org 12 | Page
message will always be possible unless the applicable rules that the short message has exceeded a certain limit
should be removed and otherwise failed to send.
In Android Operating System, we can use SMSManager API or devices Built-in SMS application to
send SMS. However, it uses a phone number system to find people and send them a message. SMS using the
conventional phone is similar to using the Android one. The difference is that the Android phone is
programmable. We can build a script to monitor the activity of the phone or maybe we can filter the SMS
content which is delivered to the inbox. The Android SMS is more flexible than the predecessor. We can attach
them to the function that we wish such as auto send, block, and many other functions.
Figure 2. SMS Interception
There are many attacks possible to SMS [2]. Figure 2 shows how the SMS can be attacked in the air.
Since SMS is wireless signal, everyone can intercept the signal and turn into the original information.
2.2 Vernam Cipher
The data security is the most significant issue in networking problem. A specific cryptography
algorithm must protect the data to maintain the integrity. One of them is Vernam Cipher. It produces the
ciphertext by doing modulo in its bits. Every character is turned into an 8-bit binary and converted into cipher
bits. The SMS will work if combined with this algorithm. In producing the ciphertext, we must provide a key to
keeping the ciphertext unbreakable. Vernam Cipher uses a very simple formula as showed next.
𝐶𝑇 = 𝑃𝑇 ⊕ 𝐾𝑒𝑦 (1)
𝑃𝑇 = 𝐶𝑇 ⊕ 𝐾𝑒𝑦 (2)
Where:
CT : bit of aftercode message
PT : bit of original message
Key : bit of password
PT is filled with the bit of the plaintext. For example, the character “A” is 65 where the binary is
01000001. To produce the ciphertext, it performs an 8-time looping. It carries out from bit 1 to bit 8. Every bit is
calculated. Formula 1 and 2 are identical. They are using the same technique to manipulate the bits. XOR is
used to encrypt and decrypt the bit.
Figure 3. Vernam Cipher bit operation
Vernam uses XOR operation to produce the ciphertext. The resulting bit "1" if the input bits are
different while "0" if they are same. Figure 3 shows the result of the bit operation. It describes how the set of
binary (A) are encrypted (G) and return to plain binary back.
Securing Short Message ServiceUsing Vernam Cipher in Android Operating System
DOI: 10.9790/0050-03041116 www.iosrjournals.org 13 | Page
III. Proposed Work
SMS sent will be forwarded to a cellular provider. GSM network will search for the destination number
and then send the message to the number. When the message arrives at the destination, the number sends an
acknowledgment back to the operator. This research proposes the method encrypts the message before
broadcasted. The message must be encrypted when the user has finished typing the content. By encrypting the
message, it is hard to convert it back without knowing the algorithm and password used before. The attacker
must know at least some of the plaintext character.
Figure 4. GSM encryption and decryption
Figure 4 describes the flow of sending and receiving a message. It must be encrypted before sent to a
destination and must be decrypted as well when receiving it. When the message is in the air, it is entirely secure.
Every attacker can steal the information, but they will have got nothing since the message is encrypted.
IV. Interface Design
The interface is designed to put the application in the mobile system. Figure 5 shows the home screen
of the application. The display consists of the message, password, phone number text boxes and three buttons of
command buttons. The application is build by using Basic4Android version 4. It is a very familiar interface to
construct the Android application. We can build either using the designer mode or even generating a toolbox
script.
Figure 5. Vernam Cipher SMS display
V. Software Testing
Now we test the apps with serveral characters. Assume we have “Hello, My Name is Andysah Putera
Utama Siahaan”. Figure 6 explains that the input characters are put in the message box.
Figure 6. Initial input (message, password and phone number)
Securing Short Message ServiceUsing Vernam Cipher in Android Operating System
DOI: 10.9790/0050-03041116 www.iosrjournals.org 14 | Page
There are two more input boxes such as password and phone number. The password is a set of
characters provided to protect the encryption. It is used to decrypting the message back to plain text after it has
arrived at the destination. The phone number is the destination itself.
Figure 7. Encrypted Message
After the Encrypt Button is pressed, the algorithm converts the plain text into cipher text by using the
separated password provided earlier. Figure 7 shows the message box is showing the illegible characters. Some
of them are illustrated like boxes. Separate applications do not show the same shape. Pressing the Decrypt
Button will get the text back to its original information. When the text is in a cipher mode, the Send Button is to
send the message to the destination number. Both participants must have the same applications to communicate
each other. Otherwise, the receiver will not understand the word that has been displayed.
VI. Evaluation
Let’s take a look at the previous example. Tabel 1 is some of the plaintext ASCII code.
Table 1. Plaintext ASCII code
H e l l O , M y
72 101 108 108 111 44 32 77 121
Table 2. Key ASCII code
K e y s h a K e y
75 101 121 115 104 97 75 101 121
Table 2 is the code of the key. The key is repeated until the length of the plaintext is met. Formula 1 is
to encrypt the plaintext into the ciphertext. To reconstruct it back to the plaintext, we can apply Formula 2.
The encryption calculation:
CT[1] = PT[1] ⊕K[1]
= 72 ⊕75
= 3
CT[2] = PT[2] ⊕K[2]
= 101⊕101
= 0
CT[3] = PT[3] ⊕K[3]
= 108⊕121
= 21
CT[4] = PT[4] ⊕K[4]
= 108⊕115
= 31
CT[5] = PT[5] ⊕K[5]
Securing Short Message ServiceUsing Vernam Cipher in Android Operating System
DOI: 10.9790/0050-03041116 www.iosrjournals.org 15 | Page
= 111⊕104
= 7
CT[6] = PT[6] ⊕K[6]
= 44⊕97
= 77
CT[7] = PT[7] ⊕K[7]
= 32⊕75
= 107
CT[8] = PT[8] ⊕K[8]
= 77⊕101
= 40
CT[9] = PT[9] ⊕K[9]
= 121⊕121
= 0
After the above calculation, the ciphertext is obtained. There are several characters are illegible. It
shows on the screen. The ASCII 0 – 31 are usually unprinted. They are marked as or any other character. The
ASCII 32 – 127 are printed and primarily used. The ASCII 128 – 255 are the extended characters that show like
symbols.Table 3 shows the result after being encrypted.
Table 3. Ciphertext ASCII code
M k (
3 0 21 31 7 77 107 40 0
Table 4. Complete process of Vernam Cipher
PT A Key A CT A
H 72 K 75 3
e 101 e 101 0
l 108 y 121 21
l 108 s 115 31
o 111 h 104 7
, 44 a 97 M 77
32 K 75 k 107
M 77 e 101 ( 40
y 121 y 121 0
32 s 115 S 83
N 78 h 104 & 38
a 97 a 97 0
m 109 K 75 & 38
e 101 e 101 0
32 y 121 Y 89
i 105 s 115 26
s 115 h 104 27
32 a 97 A 65
A 65 K 75 10
n 110 e 101 11
d 100 y 121 29
y 121 s 115 10
s 115 h 104 27
a 97 a 97 0
h 104 K 75 # 35
32 e 101 E 69
P 80 y 121 ) 41
u 117 s 115 6
t 116 h 104 28
e 101 a 97 4
r 114 K 75 9 57
a 97 e 101 4
32 y 121 Y 89
U 85 s 115 & 38
t 116 h 104 28
Securing Short Message ServiceUsing Vernam Cipher in Android Operating System
DOI: 10.9790/0050-03041116 www.iosrjournals.org 16 | Page
a 97 a 97 0
m 109 K 75 & 38
a 97 e 101 4
32 y 121 Y 89
S 83 s 115 32
i 105 h 104 1
a 97 a 97 0
h 104 K 75 # 35
a 97 e 101 4
a 97 y 121 24
n 110 s 115 29
Table 4 is the complete process of encryption and decryption. The text “Hello, My Name is Andysah
Putera Utama Siahaan” turns into encrypted message and return back to the plaintext.
VII. Conclusion
PlainSMS is very dangerous. If the content does not consist of any important thing, it does not matter.
Otherwise, it brings into trouble. Encrypting the message is the only way to secure the information personally.
The cellular network provides the mobile encryption as well, but it does not guarantee the message safely. The
attacker can intercept the message at any time. Vernam Cipher is the great common encryption method to
implement. It does not need the complex mathematical calculation. It provides the ciphertext by doing XOR
operation. The text after encryption is completely secure to transmit.
References
[1]. B. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006.
[2]. Z. Ghadialy, “The SS7 Flaws that Allows Hackers to Snoop on Your Calls and SMS,” The 3G4G Blog, 29 12 2014. [Online].
Available: http://blog.3g4g.co.uk/2014/12/the-ss7-flaws-that-allows-hackers-to.html. [Diakses 15 7 2016].
[3]. H. M. E. Bakry, A. E. T. E. Deen dan A. H. E. Tengy, “Implementation of a Hybrid Encryption Scheme for SMS / Multimedia
Messages on AndroidI,” International Journal of Computer Applications, vol. 85, no. 2, pp. 1-5, 2014.
[4]. S. Jha dan U. Dutta, “Review on SMS Encryption using MNTRU Algorithms on Android,” International Journal of Computer
Science and Information Technologies, vol. 6, no. 4, pp. 3855-3858, 2015.
[5]. A. P. U. Siahaan, “RC4 Technique in Visual Cryptography RGB Image Encryption,” International Journal of Computer Science and
Engineering, vol. 3, no. 7, pp. 1-6, 2016.
[6]. A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and
Research, vol. 5, no. 3, 2016.
[7]. R. Rayarikar, S. Upadhyay dan P. Pimpale, “SMS Encryption using AES Algorithm on Android,” International Journal of
Computer Applications, vol. 50, no. 19, pp. 12-17, 2012.
Author Profile
Andysah Putera Utama Siahaan was born in 1980, Medan, Indonesia. He received the
S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan,
Indonesia, in 2010, and in 2012, he obtained M.Kom. from the University of Sumatera
Utara, Medan, Indonesia. In 2010, he joined as a lecturer at the Department of
Engineering, Universitas Pembangunan Panca Budi. He has been a researcher since 2012.
He has studied his Ph. D. degree from 2016. He is now active in writing international
journals and conferences.

More Related Content

What's hot

Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
eSAT Publishing House
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
IJERA Editor
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
IJTET Journal
 
Ch10 1 v1
Ch10 1 v1Ch10 1 v1
Ch10 1 v1
bhagavanprasad
 
Cryptography
CryptographyCryptography
Cryptography
Veiluvanthal1981
 
IRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-AttackIRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-Attack
IRJET Journal
 
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
cscpconf
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
ijcisjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
IJNSA Journal
 

What's hot (10)

Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
Ch10 1 v1
Ch10 1 v1Ch10 1 v1
Ch10 1 v1
 
Cryptography
CryptographyCryptography
Cryptography
 
IRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-AttackIRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-Attack
 
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
 

Viewers also liked

Accoglimento del cliente
Accoglimento del clienteAccoglimento del cliente
Accoglimento del clienteptesone
 
Media kit EasyFinance
Media kit EasyFinanceMedia kit EasyFinance
Media kit EasyFinance
EasyFinance.ru
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
Universitas Pembangunan Panca Budi
 
Steve Jobs Presentations
Steve Jobs PresentationsSteve Jobs Presentations
Steve Jobs Presentations
carolineshawley
 
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da... group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
dhenzelhopkins
 
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific KnowledgeFuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
Universitas Pembangunan Panca Budi
 
Trouble shooting apachecloudstack
Trouble shooting apachecloudstackTrouble shooting apachecloudstack
Trouble shooting apachecloudstackSailaja Sunil
 

Viewers also liked (9)

Accoglimento del cliente
Accoglimento del clienteAccoglimento del cliente
Accoglimento del cliente
 
Media kit EasyFinance
Media kit EasyFinanceMedia kit EasyFinance
Media kit EasyFinance
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
 
The ice age
The ice ageThe ice age
The ice age
 
Steve Jobs Presentations
Steve Jobs PresentationsSteve Jobs Presentations
Steve Jobs Presentations
 
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da... group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific KnowledgeFuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
 
Trouble shooting apachecloudstack
Trouble shooting apachecloudstackTrouble shooting apachecloudstack
Trouble shooting apachecloudstack
 
Kalinin
KalininKalinin
Kalinin
 

Similar to Securing Short Message Service Using Vernam Cipher in Android Operating System

Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
Mousselmal Tarik
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
IRJET Journal
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking Application
IRJET Journal
 
Securedsms a protocol for sms security
Securedsms a protocol for sms securitySecuredsms a protocol for sms security
Securedsms a protocol for sms security
IAEME Publication
 
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMSLITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
International Journal of Technical Research & Application
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
Chandrapriya Rediex
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
IRJET Journal
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITYCOUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
IJNSA Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
smile790243
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Shakas Technologies
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
IJCSES Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
IJNSA Journal
 

Similar to Securing Short Message Service Using Vernam Cipher in Android Operating System (20)

Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking Application
 
Securedsms a protocol for sms security
Securedsms a protocol for sms securitySecuredsms a protocol for sms security
Securedsms a protocol for sms security
 
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMSLITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITYCOUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Universitas Pembangunan Panca Budi
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 

Securing Short Message Service Using Vernam Cipher in Android Operating System

  • 1. IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-ISSN: 2394-0050, P-ISSN: 2394-0042.Volume 3, Issue 4 (Jul. - Aug. 2016), PP 11-16 www.iosrjournals.org DOI: 10.9790/0050-03041116 www.iosrjournals.org 11 | Page Securing Short Message ServiceUsing Vernam Cipher in Android Operating System Andysah Putera Utama Siahaan Faculty of Computer Science, Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract: Although many ways to communicate with someone, SMS is still one of the popular media to send a message to someone. Not unlike the others, the messages sent can be known by the third party either tapping or the investigation. Unencrypted SMS can be easily obtained from communication providers so that they may be misused. Since the communication devices have been using Android operating system, they are programmable. There is various script can be inserted to devices to protect the data. One of them is Vernam Cipher. This method offers how to protect personal messages sent via SMS easily. It converts the message into an encrypted message shortly before sent. At the moment there tapping on the outside, the information is not easily understood its contents. The message is entirely secure. Keywords: Vernam, Mobile, SMS, Cryptography, Security, Encryption, Decryption I. Introduction Information security means securing information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction [7].Despite the emergence of digital media to communicate, SMS is still used as a system that is popular among social media. SMS has a major role in communication. Not everyone has a sophisticated device that supports internet facility. For owners of older model devices, SMS is a way that always used to deliver the message to the listener. The security of data on SMS delivery is not guaranteed. Everyone can steal the message. Although the message is personal, the message can be retrieved from a provider. When there is an investigation, the message might be generated from the database. Whatever happens at the talks, if everyone wants, the message is still readable. This method does not teach how to send the crime message, but it explains how to keep a secret message is not misused by the irresponsible parties. This research tries to modify the bits order by encrypting and providing a password. II. Theories 2.1 Android Short Message Service SMS stands for Short Message Service. It is a facility to send and receive a short text message via the wireless devices or cellular phone communication device. One of the advantages of SMS is cost. SMS is a service that is widely applied in wireless communication system. SMS enables sending messages in alphanumeric. SMS mechanism is sending a short message from one subscriber terminal to another terminal. Short Message Service Centre (SMSC) is the device that handles this operation. It is also known as Message Centre (MC). It includes the determination of search or sorts the final destination of the message.Figure 1 illustrates how the GSM Network handles the SMS. Figure 1.SMS Architecture SMS service is a non-real time service where a short message can be submitted to a destination, no matter if the destination is ready or not. When it is not active, the system will delay the delivery to the destination until the destination is active again. The SMS system guarantees the delivery of a short message to get to the destination. Temporary delivery failures always identified as a pending message. Short retransmission
  • 2. Securing Short Message ServiceUsing Vernam Cipher in Android Operating System DOI: 10.9790/0050-03041116 www.iosrjournals.org 12 | Page message will always be possible unless the applicable rules that the short message has exceeded a certain limit should be removed and otherwise failed to send. In Android Operating System, we can use SMSManager API or devices Built-in SMS application to send SMS. However, it uses a phone number system to find people and send them a message. SMS using the conventional phone is similar to using the Android one. The difference is that the Android phone is programmable. We can build a script to monitor the activity of the phone or maybe we can filter the SMS content which is delivered to the inbox. The Android SMS is more flexible than the predecessor. We can attach them to the function that we wish such as auto send, block, and many other functions. Figure 2. SMS Interception There are many attacks possible to SMS [2]. Figure 2 shows how the SMS can be attacked in the air. Since SMS is wireless signal, everyone can intercept the signal and turn into the original information. 2.2 Vernam Cipher The data security is the most significant issue in networking problem. A specific cryptography algorithm must protect the data to maintain the integrity. One of them is Vernam Cipher. It produces the ciphertext by doing modulo in its bits. Every character is turned into an 8-bit binary and converted into cipher bits. The SMS will work if combined with this algorithm. In producing the ciphertext, we must provide a key to keeping the ciphertext unbreakable. Vernam Cipher uses a very simple formula as showed next. 𝐶𝑇 = 𝑃𝑇 ⊕ 𝐾𝑒𝑦 (1) 𝑃𝑇 = 𝐶𝑇 ⊕ 𝐾𝑒𝑦 (2) Where: CT : bit of aftercode message PT : bit of original message Key : bit of password PT is filled with the bit of the plaintext. For example, the character “A” is 65 where the binary is 01000001. To produce the ciphertext, it performs an 8-time looping. It carries out from bit 1 to bit 8. Every bit is calculated. Formula 1 and 2 are identical. They are using the same technique to manipulate the bits. XOR is used to encrypt and decrypt the bit. Figure 3. Vernam Cipher bit operation Vernam uses XOR operation to produce the ciphertext. The resulting bit "1" if the input bits are different while "0" if they are same. Figure 3 shows the result of the bit operation. It describes how the set of binary (A) are encrypted (G) and return to plain binary back.
  • 3. Securing Short Message ServiceUsing Vernam Cipher in Android Operating System DOI: 10.9790/0050-03041116 www.iosrjournals.org 13 | Page III. Proposed Work SMS sent will be forwarded to a cellular provider. GSM network will search for the destination number and then send the message to the number. When the message arrives at the destination, the number sends an acknowledgment back to the operator. This research proposes the method encrypts the message before broadcasted. The message must be encrypted when the user has finished typing the content. By encrypting the message, it is hard to convert it back without knowing the algorithm and password used before. The attacker must know at least some of the plaintext character. Figure 4. GSM encryption and decryption Figure 4 describes the flow of sending and receiving a message. It must be encrypted before sent to a destination and must be decrypted as well when receiving it. When the message is in the air, it is entirely secure. Every attacker can steal the information, but they will have got nothing since the message is encrypted. IV. Interface Design The interface is designed to put the application in the mobile system. Figure 5 shows the home screen of the application. The display consists of the message, password, phone number text boxes and three buttons of command buttons. The application is build by using Basic4Android version 4. It is a very familiar interface to construct the Android application. We can build either using the designer mode or even generating a toolbox script. Figure 5. Vernam Cipher SMS display V. Software Testing Now we test the apps with serveral characters. Assume we have “Hello, My Name is Andysah Putera Utama Siahaan”. Figure 6 explains that the input characters are put in the message box. Figure 6. Initial input (message, password and phone number)
  • 4. Securing Short Message ServiceUsing Vernam Cipher in Android Operating System DOI: 10.9790/0050-03041116 www.iosrjournals.org 14 | Page There are two more input boxes such as password and phone number. The password is a set of characters provided to protect the encryption. It is used to decrypting the message back to plain text after it has arrived at the destination. The phone number is the destination itself. Figure 7. Encrypted Message After the Encrypt Button is pressed, the algorithm converts the plain text into cipher text by using the separated password provided earlier. Figure 7 shows the message box is showing the illegible characters. Some of them are illustrated like boxes. Separate applications do not show the same shape. Pressing the Decrypt Button will get the text back to its original information. When the text is in a cipher mode, the Send Button is to send the message to the destination number. Both participants must have the same applications to communicate each other. Otherwise, the receiver will not understand the word that has been displayed. VI. Evaluation Let’s take a look at the previous example. Tabel 1 is some of the plaintext ASCII code. Table 1. Plaintext ASCII code H e l l O , M y 72 101 108 108 111 44 32 77 121 Table 2. Key ASCII code K e y s h a K e y 75 101 121 115 104 97 75 101 121 Table 2 is the code of the key. The key is repeated until the length of the plaintext is met. Formula 1 is to encrypt the plaintext into the ciphertext. To reconstruct it back to the plaintext, we can apply Formula 2. The encryption calculation: CT[1] = PT[1] ⊕K[1] = 72 ⊕75 = 3 CT[2] = PT[2] ⊕K[2] = 101⊕101 = 0 CT[3] = PT[3] ⊕K[3] = 108⊕121 = 21 CT[4] = PT[4] ⊕K[4] = 108⊕115 = 31 CT[5] = PT[5] ⊕K[5]
  • 5. Securing Short Message ServiceUsing Vernam Cipher in Android Operating System DOI: 10.9790/0050-03041116 www.iosrjournals.org 15 | Page = 111⊕104 = 7 CT[6] = PT[6] ⊕K[6] = 44⊕97 = 77 CT[7] = PT[7] ⊕K[7] = 32⊕75 = 107 CT[8] = PT[8] ⊕K[8] = 77⊕101 = 40 CT[9] = PT[9] ⊕K[9] = 121⊕121 = 0 After the above calculation, the ciphertext is obtained. There are several characters are illegible. It shows on the screen. The ASCII 0 – 31 are usually unprinted. They are marked as or any other character. The ASCII 32 – 127 are printed and primarily used. The ASCII 128 – 255 are the extended characters that show like symbols.Table 3 shows the result after being encrypted. Table 3. Ciphertext ASCII code M k ( 3 0 21 31 7 77 107 40 0 Table 4. Complete process of Vernam Cipher PT A Key A CT A H 72 K 75 3 e 101 e 101 0 l 108 y 121 21 l 108 s 115 31 o 111 h 104 7 , 44 a 97 M 77 32 K 75 k 107 M 77 e 101 ( 40 y 121 y 121 0 32 s 115 S 83 N 78 h 104 & 38 a 97 a 97 0 m 109 K 75 & 38 e 101 e 101 0 32 y 121 Y 89 i 105 s 115 26 s 115 h 104 27 32 a 97 A 65 A 65 K 75 10 n 110 e 101 11 d 100 y 121 29 y 121 s 115 10 s 115 h 104 27 a 97 a 97 0 h 104 K 75 # 35 32 e 101 E 69 P 80 y 121 ) 41 u 117 s 115 6 t 116 h 104 28 e 101 a 97 4 r 114 K 75 9 57 a 97 e 101 4 32 y 121 Y 89 U 85 s 115 & 38 t 116 h 104 28
  • 6. Securing Short Message ServiceUsing Vernam Cipher in Android Operating System DOI: 10.9790/0050-03041116 www.iosrjournals.org 16 | Page a 97 a 97 0 m 109 K 75 & 38 a 97 e 101 4 32 y 121 Y 89 S 83 s 115 32 i 105 h 104 1 a 97 a 97 0 h 104 K 75 # 35 a 97 e 101 4 a 97 y 121 24 n 110 s 115 29 Table 4 is the complete process of encryption and decryption. The text “Hello, My Name is Andysah Putera Utama Siahaan” turns into encrypted message and return back to the plaintext. VII. Conclusion PlainSMS is very dangerous. If the content does not consist of any important thing, it does not matter. Otherwise, it brings into trouble. Encrypting the message is the only way to secure the information personally. The cellular network provides the mobile encryption as well, but it does not guarantee the message safely. The attacker can intercept the message at any time. Vernam Cipher is the great common encryption method to implement. It does not need the complex mathematical calculation. It provides the ciphertext by doing XOR operation. The text after encryption is completely secure to transmit. References [1]. B. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006. [2]. Z. Ghadialy, “The SS7 Flaws that Allows Hackers to Snoop on Your Calls and SMS,” The 3G4G Blog, 29 12 2014. [Online]. Available: http://blog.3g4g.co.uk/2014/12/the-ss7-flaws-that-allows-hackers-to.html. [Diakses 15 7 2016]. [3]. H. M. E. Bakry, A. E. T. E. Deen dan A. H. E. Tengy, “Implementation of a Hybrid Encryption Scheme for SMS / Multimedia Messages on AndroidI,” International Journal of Computer Applications, vol. 85, no. 2, pp. 1-5, 2014. [4]. S. Jha dan U. Dutta, “Review on SMS Encryption using MNTRU Algorithms on Android,” International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3855-3858, 2015. [5]. A. P. U. Siahaan, “RC4 Technique in Visual Cryptography RGB Image Encryption,” International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016. [6]. A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and Research, vol. 5, no. 3, 2016. [7]. R. Rayarikar, S. Upadhyay dan P. Pimpale, “SMS Encryption using AES Algorithm on Android,” International Journal of Computer Applications, vol. 50, no. 19, pp. 12-17, 2012. Author Profile Andysah Putera Utama Siahaan was born in 1980, Medan, Indonesia. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and in 2012, he obtained M.Kom. from the University of Sumatera Utara, Medan, Indonesia. In 2010, he joined as a lecturer at the Department of Engineering, Universitas Pembangunan Panca Budi. He has been a researcher since 2012. He has studied his Ph. D. degree from 2016. He is now active in writing international journals and conferences.