Securing Mobile Data using Cryptography
نویسنده
چکیده
Shikhar Bhagoliwal Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] Jyotirmoy Karjee Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] ---------------------------------------------------------------------ABSTRACT------------------------------------------------------------Portability increases the probability for a wireless device to be stolen or lost. These devices usually carry sensitive business or private information. Government Employees store classified documents on their mobile devices. Corporate users save confidential files, PINs, Passwords on their devices. So the content of such devices should be protected from unauthorized access. However, the protection provided should not be heavy for a mobile phone because it would minimize the computing power, storage space, battery lifetime. To prevent this from happening, we are providing an algorithm which would ensure data privacy for the end users. ASCII values of plain text will be used to generate a secret key and same key would be used for decryption. It can be said to be a symmetric encryption algorithm because same key is used to encrypt and decrypt the data. A Secret key will be randomly generated from the ASCII values of plain text which when encrypted with the plain text will provide a cipher text which will be sent back to the Application with the key. For Decryption, cipher text and key will be fetched from Application and decryption process will occur at server. By this method this application will not be heavy for a mobile phone and this would be an efficient method for data security.
منابع مشابه
Achieving Security in Messaging and Personal Content in Symbian Phones
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algori...
متن کاملElliptic Curve Cryptography for Securing Payment System
Mobile payment system has made it easy for people to do financial transaction. However, its security is still a concern. It needs to protect the data transferred between parties involved in the system. In this paper, we investigate the possibility use of elliptic curve cryptography to secure the data transferred in a payment system.
متن کاملApplicability of Quantum Cryptography for Securing Mobile Communication Networks
After 20 years of basic research, quantum cryptography has meanwhile led to first commercial products. Its progress has triggered high publicity and additional R&D funding. The aim of this paper is to evaluate the status of quantum cryptography regarding its practical applicability for securing (mobile) communication networks. With that aim in mind, the paper presents a survey of the state-of-t...
متن کاملRSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملReview of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Publ...
متن کاملSecuring Data by Using Cryptography with Steganography
Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...
متن کامل