Design and Implementation of Encrypted SMS on Android Smartphone Combining ECDSA - ECDH and AES

被引:0
作者
Azaim, Muhammad Haikal [1 ]
Sudiharto, Dodi Wisaksono [1 ]
Jadied, Erwid Musthofa [1 ]
机构
[1] Telkom Univ, Sch Comp, Bandung, Indonesia
来源
2016 ASIA PACIFIC CONFERENCE ON MULTIMEDIA AND BROADCASTING (APMEDIACAST) | 2016年
关键词
ECDH; ECDSA; AES; encryption; SMS; Android;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A Short Message Service (SMS) is a popular mechanism to communicate. However, for an important purpose, a mechanism to protect SMS messages is needed so the SMS messages cannot be easily read by entities who are not permitted to see. Keeping an authentication of messages, and ensuring messages are received by a right entity are also an important aspect. Maintaining confidentiality of messages, by combining symmetric and asymmetric scheme are used. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). Even so, there is a weakness while using ECDH protocol. It does not provide an authentication mechanism between entities. This means an authenticity and an integrity of messages are not fully protected. This research proposes a solution to maintain it by adding the Elliptic Curve Digital Signature algorithm (ECDSA). ECDSA is used to handle the authentication of key exchange.
引用
收藏
页码:18 / 22
页数:5
相关论文
共 18 条
[1]  
[Anonymous], 2016, CRYPTOGRAPHY DIGITAL
[2]  
Braga A., 2015, 9 SECURWARE, P67
[3]  
Elenkov N., 2014, ANDROID SECURITY INT
[4]  
Guritman S., 2005, JURNAL ILMU KOMPUTER, V3
[5]   The Elliptic Curve Digital Signature Algorithm (ECDSA) [J].
Don Johnson ;
Alfred Menezes ;
Scott Vanstone .
International Journal of Information Security, 2001, 1 (1) :36-63
[6]  
Karki A., 2014, INTERNASIONAL J ENG, V3, P69
[7]  
Khan Muhammad Waseem, 2013, International Journal of Advanced Networking and Applications, V5, P1873
[8]  
McCarthy G., 2011, CODE4LIB J, V13, P1
[9]  
Medani A., 2011, Scientific Research and Essays, V6, P1147
[10]  
Mogollon M., 2008, Cryptography and Security Services: Mechanisms and Applications: Mechanisms and Applications