A Novel Encryption Scheme for Secure SMS Communication
Security is a challenging issue in today’s digital world and for this, role of cryptography is significant. Cryptography secures data and information using an encryption algorithm and keys. There is always demand for a stronger encryption algorithm that w
- PDF / 325,292 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 32 Downloads / 231 Views
Abstract Security is a challenging issue in today’s digital world and for this, role of cryptography is significant. Cryptography secures data and information using an encryption algorithm and keys. There is always demand for a stronger encryption algorithm that would be very hard or impossible to crack without valid keys so that the privacy of intended sender and receiver information can be protected from hackers. This paper suggests a novel encryption scheme for SMS communication that uses multiple rounds of encryption to provide better privacy to the transmitted message against unauthorized access. Message integrity and authentication have been ensured by addition of authentication characters to the message. Keeping in mind the limited memory and processing capacity of mobile devices, the algorithm has been kept simpler and at the same time the strength of the scheme has been ensured with a stronger key and better mix of confusion and diffusion principles. Keywords Playfair
Encryption Cryptography Key Security
1 Introduction In today’s digital world security is a challenging issue. Cryptography plays a vital role in providing data security against attackers, so cryptographic algorithms are widely and frequently used as a means of ensuring that information is secure.
A. Malla P. Sahu M. Mishra (&) Department of Information & Communication Technology, Fakir Mohan University, Balasore, Odisha, India e-mail: [email protected] A. Malla e-mail: [email protected] P. Sahu e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 A. Kalam et al. (eds.), Advances in Electronics, Communication and Computing, Lecture Notes in Electrical Engineering 443, https://doi.org/10.1007/978-981-10-4765-7_50
467
468
A. Malla et al.
The importance of cryptography is growing with the increasing worldwide utilization of the Internet. Some of the terminologies related to cryptography are mentioned below. Cryptography has been derived from two Greek words and it means ‘the process of secret writing’. In this process, a ‘plain text’ message is converted or ‘encrypted’/ ‘enciphered’ to a coded message known as ‘cipher text’. There is always a demand for stronger encryption which is very hard to crack by an unauthorized user. The process of converting the readable ‘plain text’ to unintelligible ‘cipher text’ and the reverse is known as cryptography. ‘Cryptanalysis’, analyzes the strengths of a crypto scheme. Cryptography and cryptanalysis together constitute the domain ‘cryptology’ [1]. The overall process of encryption and decryption is given in Fig. 1.
1.1
Types of Cryptosystem
Depending on key used, cryptosystems are divided into three types; symmetric key cryptosystem, asymmetric key cryptosystem, and keyless cryptosystem. In Symmetric cryptosystem both encryption and decryption keys are same whereas in asymmetric cryptosystem a pair of keys, public and private are used. Public key is announced to all members while the private key is only known to the receiver. Sender uses the public key
Data Loading...