A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1474988

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 619

References:


[1] Agoyi, M., and Seral, D. (2010). SMS security: an asymmetric encryption approach. In Wireless and Mobile Communications (ICWMC), 6th International Conference on IEEE, 448-452.
[2] Saxena, N., and Chaudhari, N. S. (2011). A secure digital signature approach for SMS security. International journal of Computer Application (IJCA), ISBN, 978-93.
[3] Heshem A. El Zouka (2015). Providing end-to-end secure communications in GSM networks. International Journal of Network Security and Its Applications (IJNSA) Vol. 7
[4] Medani, A., Gani, A., Zakaria, O., Zaidan, A. A., and Zaidan, B. B. (2011). Review of mobile short message service security issues and techniques towards the solution. Scientific Research and Essays, 6(6), 1147-1165.
[5] Gu, G., and Peng, G. (2010). The survey of GSM wireless communication system. 2010 International Conference on Computer and Information Application. 121-124.
[6] Oancea, C. D. (2011). GSM infrastructure used for data transmission. 7th International Symposium Advanced Topics In Electrical Engineering (ATEE) 1-4.
[7] Saily, M., Sebire, G., and Riddington, E. (Eds.). (2011). GSM/EDGE: Evolution and performance.
[8] Penttinen J. T. J (2015). The telecommunication handbook: Engineering guidelines for fixed mobile and satellite systems. Wiley-Blackwell 281-289.
[9] Sahin M. E, Nilufr A. S & Karan Yasin (2013), Selective radiation measurement for safety evaluation of base stations. Turkey, Gazi University Journal of science 26(1) 73-83.
[10] Rakestraw, T. L., Eunni, R. and Kasuganti, R. R. (2013). The mobile apps industry: A case study. Journal of Business Cases and Applications.
[11] Duggan, M. (2015). Mobile messaging and social media 2015. Retrieved January 30, 2017, from http://www.pewinternet.org/2015/08/19/mobile-messaging-and-social- media-2015/.
[12] Khan, M. W. (2013). SMS Security in Mobile Devices: A Survey. International Journal of Advanced Networking and Applications, 5(2), 1873.
[13] Markovski, Smile, Aleksandra Kuzmanovska, and Milivoj Simeonovski. "A protocol for secure sms communication for android os." In ICT Innovations 2011, pp. 171-178. Springer Berlin Heidelberg, 2012.
[14] Arreymbi, J. (2011). Investigating Issues in Mobile Network in Security. Journal of Modern Applied Science, 2(6), 3-10.
[15] Rayarikar, Rahin, Sadiku and Marmor T (2012). SMS encryption using AES Algorithm onandroid IJCA 50.19.
[16] Raheem A., (2014). An Investigation into Authentication Security of GSM Algorithm for Mobile Banking.
[17] Rautkar, S. D., and Prasad, D. P. S. (2015). An overview of real time secure SMS transmission. International Journal of Advanced Research in Computer and Communication Engineering, 4(1).
[18] Bruen, Aiden A. and Forcinito, Mario A. (2011) .Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century. 21-29.
[19] Menezes, A. J., VanOorshot, P. C. and Vanstone, S. A. (2010). Applied Cryptography.
[20] Kumar, Y., Munjal, R., & Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. International Journal of Computer Science and Management Studies, 11(03).
[21] Gaithuru, J. N., Bakhtiari, M., Salleh, M., and Muteb, A. M. (2015). A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap. In Software Engineering Conference (MySEC), 236-244 IEEE.
[22] Nath, A., Ghosh, S., and Mallick, M. A. (2010). Symmetric Key Cryptography Using Random Key Generator. In Security and Management, 234-242.
[23] Sindhu UL (2016), “Implementation of secured SMS for end to end communication using RSA algorithm”, International Journal of Multidisciplinary Research.
[24] Kessler, G.C., (2012). “Introduction to Cryptography”.
[25] Elia, M., Piva, M., & Schipani, D. (2015). The RABIN cryptosystem.