Achieving Security in Messaging and Personal Content in Symbian Phones

作者: Ahmed Enany

DOI:

关键词: Mobile computingComputer securityCryptographyMobile deviceBlowfishEncryptionComputer scienceAuthenticationMobile searchShort Message Service

摘要: This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well one scheme content. The security services we considered in securing the messages are confidentiality, authentication, non-repudiation and integrity. We Identity Based Cryptography order Blowfish algorithm Due some of disadvantages imposed by Cryptography, recommended using it along with RSA algorithm. were implemented java tested on an actual device, Nokia N70. In addition, measured time required each algorithms encrypt/decrypt a certain number bytes. found taken will not noticeable user. However, since implementation was meant run devices, encountered delay whenever encrypting/decrypting data this Securing SMS make means conduct m-commerce. MMS content increase usability reliability phones especially users move.

参考文章(19)
Reihaneh Safavi-Naini, Willy Susilo, Joonsang Baek, Jan Newmarch, A Survey of Identity-Based Cryptography ,(2004)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Clifford Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues Lecture Notes in Computer Science. pp. 360- 363 ,(2001) , 10.1007/3-540-45325-3_32
M. Hassinen, Java based Public Key Infrastructure for SMS Messaging international conference on information and communication technologies. ,vol. 1, pp. 88- 93 ,(2006) , 10.1109/ICTTA.2006.1684350
Audun Jøsang, Mary Anne Patton, User interface requirements for authentication of communication australasian user interface conference. pp. 75- 80 ,(2003)
Tom Dowling, Louise Owens, Adam Duffy, An Identity Based Encryption system principles and practice of programming in java. pp. 154- 159 ,(2004) , 10.5555/1071565.1071594
P. Garner, I. Mullins, R. Edwards, P. Coulton, Mobile Terminated SMS Billing — Exploits and Security Analysis international conference on information technology new generations. pp. 294- 299 ,(2006) , 10.1109/ITNG.2006.94
Jonna Häkkilä, Craig Chatfield, 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication human computer interaction with mobile devices and services. pp. 219- 222 ,(2005) , 10.1145/1085777.1085814