Open Access   Article Go Back

Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality

Shahebaz Ahmed Khan1 , P. Padmanabham2 , K V Naganjaneyulu3

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 79-83, Oct-2015

Online published on Oct 31, 2015

Copyright © Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu, “Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.79-83, 2015.

MLA Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu "Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality." International Journal of Computer Sciences and Engineering 3.10 (2015): 79-83.

APA Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu, (2015). Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality. International Journal of Computer Sciences and Engineering, 3(10), 79-83.

BibTex Style Citation:
@article{Khan_2015,
author = {Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu},
title = {Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {79-83},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=709},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=709
TI - Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality
T2 - International Journal of Computer Sciences and Engineering
AU - Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 79-83
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2428 2340 downloads 2320 downloads
  
  
           

Abstract

The idea of this paper is to study the symmetric key algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. so that the better algorithm can be picked to import its functionality in the Android based mobile devices. Here, we analyse their performance mainly this beats, end memory requirements and speed are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. The above algorithms will be first implemented in C, C++ or JAVA and their performance will be analysed. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving a single digit. The message will be decrypted only after the full key version is matched with the given symmetry of the key .This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.

Key-Words / Index Term

Non-repudiation, symmetric algorithms, RC5,DES, AES, 3DES, full key, cryptography

References

[1.] Atul Kahate “Cryptography and Network Security”, Tata McGraw-Hill Companies, 2008.
[2.] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004
[3] Ronald L. Rivest, “RC5 Encryption Algorithm”, Dr Dobbs Journal, Vol. 226, PP. 146-148, Jan 1995
[4] Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997).
[5]Khawlah A. AI-Rayes, Aise Zulal Sevkli, Hebah F. AI-Moaiqel, Haifa M. AI-Ajlan, Khawlah M. AI-Salem, Norah I. AI-Fantoukh "A Mobile Tourist Guide for Trip Planning" IEEE MULTIDISCIPLINARY ENGINEERING EDUCATION MAGAZINE, VOL. 6, NO. 4, DECEMBER 2011
[6]MIDP_Mobile_Media_API_Developers_Guide_v2_en
[7] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.
[8.] R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Volume 21 No. 2, Feb. 1978.
[9] Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997). Available at: httu://theory.lcs.mit.cdu/-rivest/Rivest-rc5rev.pd
[10]“Detecting passive content leaks and pollution in android applications,” in Proceedings of the Network and Distributed System Security Symposium , 2013.