SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 6, Ver. II (Nov. - Dec. 2016), PP 54-58
www.iosrjournals.org
DOI: 10.9790/0661-18060205458 www.iosrjournals.org 54 | Page
SMS EncryptionUsing One-Time Pad Cipher
Muhammad Iqbal1
, Muhammad Akbar Syahbana Pane2
,
Andysah Putera Utama Siahaan3
Faculty of Computer Science
1,3
Universitas Pembangunan Panca Budi
2
Universiti Malaysia Perlis
1,3
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
2
02600 Arau, Perlis, Malaysia
Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown
participants can not retrieve it. To protect the SMS content, the sender must provide the unique character
before it is completely sent. The cryptography technique is needed. The plaintext has to be encrypted before
transmitted. The one-time pad method can be applied to the plaintext. The one-time pad is one of the easiest
cryptography methods. It turns the plaintext into the ciphertext by doing XOR operation to every character. It
generates the new ASCII as the cipher character.
Keywords: One-Time Pad, Cryptography, Security
I. Introduction
A cell phone is one result of the development of communications technology [1][2]. There are some
communications services that can be used on mobile phones, such as telephone service, video call, SMS, and
MMS. Short Message Service (SMS) or short message is a function of communication that is widely used by
mobile phone users. One reason the SMS became one of the most important services and necessary because
SMS is easy to use and costs incurred for sending SMS is relatively inexpensive [8]. But along with the
increasing number of mobile phones that use the SMS service is not offset by a factor of security that existed at
the service. Many mobile phone users are not aware that SMS does not guarantee the integrity and security of
the message. In communicating through SMS, messages sent information can be stolen by others. The
weakness is caused due to an SMS using a universal coding standard; SMS is built with a system language
program language similar to programs such as computer hardware, and mobile phones can translate all the data
in a specific frequency that is open (in the air).
One SMS security process that can be used in the process of storing or sending SMS is to perform the
cryptographic process [8]. A cryptographic process is usually done by scrambling the data so that the original
file is not easy to read or hijacked by certain circles are not interested. Many algorithms or methods that could
be used for the cryptographic process. Methods Vernam Cipher is one of the manifold symmetric key algorithm
key used to perform encryption and decryption using the same key. In the process of encryption, Vernam
Cipher algorithm uses way cipher stream cipher which is derived from the XOR between bit plaintext and the
bit key, whereas for the binary permutation is done by reversing the binary code for each character. In this
report will be discussed in the program applications that can perform cryptographic process to a file where the
cryptographic process comprising encryption and decryption using the Vernam Cipher.
II. Theories
A. Cryptography
As The word cryptography is derived from the Greek, "Kryptos" meaning hidden and "graphein"
which means writing. So the word cryptography can be interpreted in the form of the phrase "hidden writing."
According to the Request for Comments (RFC), cryptography is the science of mathematics dealing with the
transformation of data to make meaning it can not be understood (to hide its meaning), to prevent it from
changing without permission or prevent it from unauthorized use [3][4][5]. If the transformation can be restored,
cryptography can also be interpreted as a process of converting encrypted data back into a form that can be
understood. That is, cryptography can be defined as the process to protect data in the broadest sense.
Menezes, Oorschot, and Vanstone (1996) states that cryptography is a study of mathematical techniques related
to aspects of information security are like confidentiality, data integrity, authentication and entity data
authentication. Authenticity means not only the provision of information security but rather a set of techniques.
In general, the encryption and decryption operations can be described mathematically as follows:
SMS EncryptionUsing One-Time Pad Cipher
DOI: 10.9790/0661-18060205458 www.iosrjournals.org 55 | Page
EK (M) = C (Encryption Process)
DK (C) = M (Decryption Process)
At the time of the encryption process we encrypt a message M with a key K and C. While the message
is generated in the decryption process, message C is described by using a key K so that the resulting message M
is the same as the previous message [6][7].Thus the security of a message depends on the key or keys that are
used and does not depend on the algorithm used. So the algorithms used they can be published and analyzed, as
well as products that use these algorithms can be mass produced. It does not matter if someone knows the
algorithm that we use. As long as he does not know the key used, he still can not read the message.
B. One Time Pad
One Time Pad included in a group of symmetric cryptography. It contains a row of characters
randomly generated keys. This cipher is implemented through a key consisting of a set of random characters
that are not repetitive. At One Time Pad, each letter key is used once for a single message and not reused. The
length of the key character streams equal to the length of the message [8].One Time Pad was found in 1917 by
Major Joseph Mauborgne. Cipher is included into the group of cryptographic algorithms symmetry. One Time
Pad (pad = paper notebooks) contain rows of characters randomly generated keys. Originally, the fruit of the
one-time pad is a tape (tape) which contain rows of key characters. One pad is used only once (one time) only
to encrypt the message after the pad has been used demolished so as not to be reused for other encrypting
messages. Rules encryption used the same as in Vigenere Cipher. The sender uses each character key to encrypt
the plaintext characters [8].
Encryption can be described as the sum of the plaintext characters with a one-time pad key character:
C = (P ⊕K) (1)
Where:
P : plaintext characters
K : key characters
C : ciphertext characters
Once the sender encrypts the message with the one-time pad, the sender destroyed the one-time pad. The
recipients of the message using the same one-time pad to decrypt the ciphertext characters into characters
plaintext by the equation:
P = (C ⊕K) (2)
An algorithm is said to be safe, if not there is no way to find her plaintext. Until now, only the
algorithm One Time Pad (OTP) which otherwise could not be solved though given unlimited
resources.Encryption on the principle of the algorithm is to combine each character in the plaintext with the
characters on the keys. Therefore, the key length must be at least equal to the length of the plaintext. In theory,
it is impossible to decrypt ciphertext without knowing the key. For if the key used was incorrect, erroneous
results will be obtained as well, or not plaintext should be. Then each key can only be used for one message.
The key collection should be done randomly so in the unpredictable opponent, and the number of key
characters must be as many as the number of characters of the message.
III. Interface Design
This section describes the interface design of the SMS encryption. The following figure illustrate the function
of the interface respectively.
Fig. 1 SMS Interface Design
SMS EncryptionUsing One-Time Pad Cipher
DOI: 10.9790/0661-18060205458 www.iosrjournals.org 56 | Page
Where:
A : Message Box
B : Password Box
C : Phone Number
D : Encrypt Button
E : Decrypt Button
F : Send Button
G : Incoming Message List
IV. Result and Discussion
In a research analysis algorithm is an algorithm Vernam Cipher Key symmetric manifold where the
keys used in encryption and decryption are the same keys. For encryption, algorithm it uses the stream cipher
that is derived from the XOR between bit plaintext with bits Key. In this algorithm, the plaintext is converted
into ASCII code and then XOR operation performed on the key that has been converted into ASCII code
anyway.
A. Encryption
Let’s take a look at the previous example. Tabel 1 is some of the plaintext ASCII code.
Plaintext = AKBAR
Table 1. Plaintext ASCII code
P1 P2 P3 P4 P5
Plaintext A K B A R
ASCII 65 75 66 65 82
Binary 1000001 1001011 1000010 1000001 1010010
If the number of key bits fewer than the number of plaintexts, the key will be looping in the one-time cipher
algorithm because the number of bits in the key must be equal to the number of bits of plaintext.
Table 2. Key ASCII code
KV1 KV2 KV3 KV4 KV5
Key 1 2 3 1 2
ASCII 49 50 51 49 50
Biner 110001 110010 110011 110001 110010
Table 2 is the code of the key. The key is repeated until the length of the plaintext is met.
The encryption calculation:
SMS EncryptionUsing One-Time Pad Cipher
DOI: 10.9790/0661-18060205458 www.iosrjournals.org 57 | Page
After the above calculation, the ciphertext is obtained. There are several characters are illegible. It shows on the
screen. The ASCII 0 – 31 are usually unprinted. They are marked as or any other character. The ASCII 32 –
127 are printed and primarily used. The ASCII 128 – 255 are the extended characters that show like symbols.
Table 3 shows the result after being encrypted [8].
Table 3. Ciphertext ASCII code
CV1 CV2 CV3 CV4 CV5
Ciphertext P Y q p `
ASCII 112 121 113 112 96
Biner 1110000 1111001 1110001 1110000 1100000
B. Decryption
To perform the decryption process, first, do the xor operation using the same formula. At this stage of the
method, the ciphertext is decrypted with a key early on when to do the encryption, where the key initial plan
writer is 12312.
Table 4. Decryption process
(ciphertext xor key) ASCII Plaintext
01110000 xor 00110001 = 01000001 65 A
01111001 xor 00110010 = 01001011 75 K
01110001 xor 00110011 = 01000010 66 B
01110000 xor 00110001 = 01000001 65 A
01100000 xor 00110010 = 01010010 82 R
Table 4 show the calculation of the decryption process. The ciphertext is converted back into the plaintext by
using the key provided earlier. The ASCII generated is similar with the first declared.
The decryption calculation:
V. Conclusion
The conclusion that can be drawn from the manufacture of security applications SMS with Vernam
cipher algorithms and cipher feedback is the use of encryption on a message; then the message is confidential
can be kept confidential from the parties who are not interested. Messages can only be read by someone who
has authority. Between the sender and the recipient must agree in advance a password that will be used to
expedite the process of sending and receiving SMS.
VI. Future Scope
In this study, certainly not free of shortcomings, and may be enhanced by subsequent researchers. To
further enhance this application the author gives some suggestions, among others, these applications can be
added security features, making it more awake their privacy. Encryption and decryption process in this method
can be combined with other methods so that the security level is reached. Online authentication is better applied
to the next security techniques to ensure the key integrity.
SMS EncryptionUsing One-Time Pad Cipher
DOI: 10.9790/0661-18060205458 www.iosrjournals.org 58 | Page
References
[1]. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006.
[2]. Z. Ghadialy, “The SS7 Flaws that Allows Hackers to Snoop on Your Calls and SMS,” The 3G4G Blog, 29 12 2014. [Online].
Available: http://blog.3g4g.co.uk/2014/12/the-ss7-flaws-that-allows-hackers-to.html. [Diakses 15 7 2016].
[3]. H. M. E. Bakry, A. E. T. E. Deen dan A. H. E. Tengy, “Implementation of a Hybrid Encryption Scheme for SMS / Multimedia
Messages on AndroidI,” International Journal of Computer Applications, vol. 85, no. 2, pp. 1-5, 2014.
[4]. S. Jha dan U. Dutta, “Review on SMS Encryption using MNTRU Algorithms on Android,” International Journal of Computer
Science and Information Technologies, vol. 6, no. 4, pp. 3855-3858, 2015.
[5]. A. P. U. Siahaan, “RC4 Technique in Visual Cryptography RGB Image Encryption,” International Journal of Computer Science
and Engineering, vol. 3, no. 7, pp. 1-6, 2016.
[6]. A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and
Research, vol. 5, no. 3, 2016.
[7]. R. Rayarikar, S. Upadhyay dan P. Pimpale, “SMS Encryption using AES Algorithm on Android,” International Journal of
Computer Applications, vol. 50, no. 19, pp. 12-17, 2012.
[8]. A. P. U. Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System,” IOSR Journal of Mobile
Computing & Application, vol. 3, no. 4, pp. 11-16, 2016.

More Related Content

What's hot

What's hot (20)

Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATION
SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATIONSMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATION
SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATIONEditor IJMTER
 
Graph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS DetectionGraph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS DetectionSOYEON KIM
 
Informatika 5 agdash_gulnar_valiyeva_gunduz
Informatika 5 agdash_gulnar_valiyeva_gunduzInformatika 5 agdash_gulnar_valiyeva_gunduz
Informatika 5 agdash_gulnar_valiyeva_gunduzmimio_azerbaijan
 
олімпійці нашого краю
олімпійці нашого краюолімпійці нашого краю
олімпійці нашого краюjulysigida
 
Artiklen - Ting som lister kan
Artiklen - Ting som lister kanArtiklen - Ting som lister kan
Artiklen - Ting som lister kanPeter Bye Andersen
 
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...Firstbeat
 
Nordic API days 2016 - APIs.guru Wikipedia for Web APIs
Nordic API days 2016 - APIs.guru Wikipedia for Web APIsNordic API days 2016 - APIs.guru Wikipedia for Web APIs
Nordic API days 2016 - APIs.guru Wikipedia for Web APIsIvan Goncharov
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 

Viewers also liked (16)

SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATION
SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATIONSMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATION
SMS SEARCH: AN ENHANCED MOBILE SEARCHING APPLICATION
 
Ai group-seminar-2013 nbc
Ai group-seminar-2013 nbcAi group-seminar-2013 nbc
Ai group-seminar-2013 nbc
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Graph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS DetectionGraph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS Detection
 
Catherynne
CatherynneCatherynne
Catherynne
 
Az
AzAz
Az
 
Informatika 5 agdash_gulnar_valiyeva_gunduz
Informatika 5 agdash_gulnar_valiyeva_gunduzInformatika 5 agdash_gulnar_valiyeva_gunduz
Informatika 5 agdash_gulnar_valiyeva_gunduz
 
олімпійці нашого краю
олімпійці нашого краюолімпійці нашого краю
олімпійці нашого краю
 
Advanced OH&S
Advanced OH&SAdvanced OH&S
Advanced OH&S
 
Artiklen - Ting som lister kan
Artiklen - Ting som lister kanArtiklen - Ting som lister kan
Artiklen - Ting som lister kan
 
The roles of ICT in driverless, automated railway operations
The roles of ICT in driverless, automated railway operationsThe roles of ICT in driverless, automated railway operations
The roles of ICT in driverless, automated railway operations
 
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...
Milloin stressi vahvistaa tai kuluttaa? Sykevälivaihtelun mittaus työterveysy...
 
Nordic API days 2016 - APIs.guru Wikipedia for Web APIs
Nordic API days 2016 - APIs.guru Wikipedia for Web APIsNordic API days 2016 - APIs.guru Wikipedia for Web APIs
Nordic API days 2016 - APIs.guru Wikipedia for Web APIs
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Présentation Italie
Présentation ItaliePrésentation Italie
Présentation Italie
 

Similar to SMS Encryption Using One-Time Pad Cipher

A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 

Similar to SMS Encryption Using One-Time Pad Cipher (20)

A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

SMS Encryption Using One-Time Pad Cipher

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 6, Ver. II (Nov. - Dec. 2016), PP 54-58 www.iosrjournals.org DOI: 10.9790/0661-18060205458 www.iosrjournals.org 54 | Page SMS EncryptionUsing One-Time Pad Cipher Muhammad Iqbal1 , Muhammad Akbar Syahbana Pane2 , Andysah Putera Utama Siahaan3 Faculty of Computer Science 1,3 Universitas Pembangunan Panca Budi 2 Universiti Malaysia Perlis 1,3 Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia 2 02600 Arau, Perlis, Malaysia Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique character before it is completely sent. The cryptography technique is needed. The plaintext has to be encrypted before transmitted. The one-time pad method can be applied to the plaintext. The one-time pad is one of the easiest cryptography methods. It turns the plaintext into the ciphertext by doing XOR operation to every character. It generates the new ASCII as the cipher character. Keywords: One-Time Pad, Cryptography, Security I. Introduction A cell phone is one result of the development of communications technology [1][2]. There are some communications services that can be used on mobile phones, such as telephone service, video call, SMS, and MMS. Short Message Service (SMS) or short message is a function of communication that is widely used by mobile phone users. One reason the SMS became one of the most important services and necessary because SMS is easy to use and costs incurred for sending SMS is relatively inexpensive [8]. But along with the increasing number of mobile phones that use the SMS service is not offset by a factor of security that existed at the service. Many mobile phone users are not aware that SMS does not guarantee the integrity and security of the message. In communicating through SMS, messages sent information can be stolen by others. The weakness is caused due to an SMS using a universal coding standard; SMS is built with a system language program language similar to programs such as computer hardware, and mobile phones can translate all the data in a specific frequency that is open (in the air). One SMS security process that can be used in the process of storing or sending SMS is to perform the cryptographic process [8]. A cryptographic process is usually done by scrambling the data so that the original file is not easy to read or hijacked by certain circles are not interested. Many algorithms or methods that could be used for the cryptographic process. Methods Vernam Cipher is one of the manifold symmetric key algorithm key used to perform encryption and decryption using the same key. In the process of encryption, Vernam Cipher algorithm uses way cipher stream cipher which is derived from the XOR between bit plaintext and the bit key, whereas for the binary permutation is done by reversing the binary code for each character. In this report will be discussed in the program applications that can perform cryptographic process to a file where the cryptographic process comprising encryption and decryption using the Vernam Cipher. II. Theories A. Cryptography As The word cryptography is derived from the Greek, "Kryptos" meaning hidden and "graphein" which means writing. So the word cryptography can be interpreted in the form of the phrase "hidden writing." According to the Request for Comments (RFC), cryptography is the science of mathematics dealing with the transformation of data to make meaning it can not be understood (to hide its meaning), to prevent it from changing without permission or prevent it from unauthorized use [3][4][5]. If the transformation can be restored, cryptography can also be interpreted as a process of converting encrypted data back into a form that can be understood. That is, cryptography can be defined as the process to protect data in the broadest sense. Menezes, Oorschot, and Vanstone (1996) states that cryptography is a study of mathematical techniques related to aspects of information security are like confidentiality, data integrity, authentication and entity data authentication. Authenticity means not only the provision of information security but rather a set of techniques. In general, the encryption and decryption operations can be described mathematically as follows:
  • 2. SMS EncryptionUsing One-Time Pad Cipher DOI: 10.9790/0661-18060205458 www.iosrjournals.org 55 | Page EK (M) = C (Encryption Process) DK (C) = M (Decryption Process) At the time of the encryption process we encrypt a message M with a key K and C. While the message is generated in the decryption process, message C is described by using a key K so that the resulting message M is the same as the previous message [6][7].Thus the security of a message depends on the key or keys that are used and does not depend on the algorithm used. So the algorithms used they can be published and analyzed, as well as products that use these algorithms can be mass produced. It does not matter if someone knows the algorithm that we use. As long as he does not know the key used, he still can not read the message. B. One Time Pad One Time Pad included in a group of symmetric cryptography. It contains a row of characters randomly generated keys. This cipher is implemented through a key consisting of a set of random characters that are not repetitive. At One Time Pad, each letter key is used once for a single message and not reused. The length of the key character streams equal to the length of the message [8].One Time Pad was found in 1917 by Major Joseph Mauborgne. Cipher is included into the group of cryptographic algorithms symmetry. One Time Pad (pad = paper notebooks) contain rows of characters randomly generated keys. Originally, the fruit of the one-time pad is a tape (tape) which contain rows of key characters. One pad is used only once (one time) only to encrypt the message after the pad has been used demolished so as not to be reused for other encrypting messages. Rules encryption used the same as in Vigenere Cipher. The sender uses each character key to encrypt the plaintext characters [8]. Encryption can be described as the sum of the plaintext characters with a one-time pad key character: C = (P ⊕K) (1) Where: P : plaintext characters K : key characters C : ciphertext characters Once the sender encrypts the message with the one-time pad, the sender destroyed the one-time pad. The recipients of the message using the same one-time pad to decrypt the ciphertext characters into characters plaintext by the equation: P = (C ⊕K) (2) An algorithm is said to be safe, if not there is no way to find her plaintext. Until now, only the algorithm One Time Pad (OTP) which otherwise could not be solved though given unlimited resources.Encryption on the principle of the algorithm is to combine each character in the plaintext with the characters on the keys. Therefore, the key length must be at least equal to the length of the plaintext. In theory, it is impossible to decrypt ciphertext without knowing the key. For if the key used was incorrect, erroneous results will be obtained as well, or not plaintext should be. Then each key can only be used for one message. The key collection should be done randomly so in the unpredictable opponent, and the number of key characters must be as many as the number of characters of the message. III. Interface Design This section describes the interface design of the SMS encryption. The following figure illustrate the function of the interface respectively. Fig. 1 SMS Interface Design
  • 3. SMS EncryptionUsing One-Time Pad Cipher DOI: 10.9790/0661-18060205458 www.iosrjournals.org 56 | Page Where: A : Message Box B : Password Box C : Phone Number D : Encrypt Button E : Decrypt Button F : Send Button G : Incoming Message List IV. Result and Discussion In a research analysis algorithm is an algorithm Vernam Cipher Key symmetric manifold where the keys used in encryption and decryption are the same keys. For encryption, algorithm it uses the stream cipher that is derived from the XOR between bit plaintext with bits Key. In this algorithm, the plaintext is converted into ASCII code and then XOR operation performed on the key that has been converted into ASCII code anyway. A. Encryption Let’s take a look at the previous example. Tabel 1 is some of the plaintext ASCII code. Plaintext = AKBAR Table 1. Plaintext ASCII code P1 P2 P3 P4 P5 Plaintext A K B A R ASCII 65 75 66 65 82 Binary 1000001 1001011 1000010 1000001 1010010 If the number of key bits fewer than the number of plaintexts, the key will be looping in the one-time cipher algorithm because the number of bits in the key must be equal to the number of bits of plaintext. Table 2. Key ASCII code KV1 KV2 KV3 KV4 KV5 Key 1 2 3 1 2 ASCII 49 50 51 49 50 Biner 110001 110010 110011 110001 110010 Table 2 is the code of the key. The key is repeated until the length of the plaintext is met. The encryption calculation:
  • 4. SMS EncryptionUsing One-Time Pad Cipher DOI: 10.9790/0661-18060205458 www.iosrjournals.org 57 | Page After the above calculation, the ciphertext is obtained. There are several characters are illegible. It shows on the screen. The ASCII 0 – 31 are usually unprinted. They are marked as or any other character. The ASCII 32 – 127 are printed and primarily used. The ASCII 128 – 255 are the extended characters that show like symbols. Table 3 shows the result after being encrypted [8]. Table 3. Ciphertext ASCII code CV1 CV2 CV3 CV4 CV5 Ciphertext P Y q p ` ASCII 112 121 113 112 96 Biner 1110000 1111001 1110001 1110000 1100000 B. Decryption To perform the decryption process, first, do the xor operation using the same formula. At this stage of the method, the ciphertext is decrypted with a key early on when to do the encryption, where the key initial plan writer is 12312. Table 4. Decryption process (ciphertext xor key) ASCII Plaintext 01110000 xor 00110001 = 01000001 65 A 01111001 xor 00110010 = 01001011 75 K 01110001 xor 00110011 = 01000010 66 B 01110000 xor 00110001 = 01000001 65 A 01100000 xor 00110010 = 01010010 82 R Table 4 show the calculation of the decryption process. The ciphertext is converted back into the plaintext by using the key provided earlier. The ASCII generated is similar with the first declared. The decryption calculation: V. Conclusion The conclusion that can be drawn from the manufacture of security applications SMS with Vernam cipher algorithms and cipher feedback is the use of encryption on a message; then the message is confidential can be kept confidential from the parties who are not interested. Messages can only be read by someone who has authority. Between the sender and the recipient must agree in advance a password that will be used to expedite the process of sending and receiving SMS. VI. Future Scope In this study, certainly not free of shortcomings, and may be enhanced by subsequent researchers. To further enhance this application the author gives some suggestions, among others, these applications can be added security features, making it more awake their privacy. Encryption and decryption process in this method can be combined with other methods so that the security level is reached. Online authentication is better applied to the next security techniques to ensure the key integrity.
  • 5. SMS EncryptionUsing One-Time Pad Cipher DOI: 10.9790/0661-18060205458 www.iosrjournals.org 58 | Page References [1]. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006. [2]. Z. Ghadialy, “The SS7 Flaws that Allows Hackers to Snoop on Your Calls and SMS,” The 3G4G Blog, 29 12 2014. [Online]. Available: http://blog.3g4g.co.uk/2014/12/the-ss7-flaws-that-allows-hackers-to.html. [Diakses 15 7 2016]. [3]. H. M. E. Bakry, A. E. T. E. Deen dan A. H. E. Tengy, “Implementation of a Hybrid Encryption Scheme for SMS / Multimedia Messages on AndroidI,” International Journal of Computer Applications, vol. 85, no. 2, pp. 1-5, 2014. [4]. S. Jha dan U. Dutta, “Review on SMS Encryption using MNTRU Algorithms on Android,” International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3855-3858, 2015. [5]. A. P. U. Siahaan, “RC4 Technique in Visual Cryptography RGB Image Encryption,” International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016. [6]. A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and Research, vol. 5, no. 3, 2016. [7]. R. Rayarikar, S. Upadhyay dan P. Pimpale, “SMS Encryption using AES Algorithm on Android,” International Journal of Computer Applications, vol. 50, no. 19, pp. 12-17, 2012. [8]. A. P. U. Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System,” IOSR Journal of Mobile Computing & Application, vol. 3, no. 4, pp. 11-16, 2016.