Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality
Keywords:
Non-repudiation, symmetric algorithms, RC5, DES, AES, 3DES, full key, cryptographyAbstract
The idea of this paper is to study the symmetric key algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. so that the better algorithm can be picked to import its functionality in the Android based mobile devices. Here, we analyse their performance mainly this beats, end memory requirements and speed are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. The above algorithms will be first implemented in C, C++ or JAVA and their performance will be analysed. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving a single digit. The message will be decrypted only after the full key version is matched with the given symmetry of the key .This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.
References
] Atul Kahate “Cryptography and Network Security”, Tata McGraw-Hill Companies, 2008.
] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004
Ronald L. Rivest, “RC5 Encryption Algorithm”, Dr Dobbs Journal, Vol. 226, PP. 146-148, Jan 1995
Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997).
Khawlah A. AI-Rayes, Aise Zulal Sevkli, Hebah F. AI-Moaiqel, Haifa M. AI-Ajlan, Khawlah M. AI-Salem, Norah I. AI-Fantoukh "A Mobile Tourist Guide for Trip Planning" IEEE MULTIDISCIPLINARY ENGINEERING EDUCATION MAGAZINE, VOL. 6, NO. 4, DECEMBER 2011
MIDP_Mobile_Media_API_Developers_Guide_v2_en
Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.
] R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Volume 21 No. 2, Feb. 1978.
Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997). Available at: httu://theory.lcs.mit.cdu/-rivest/Rivest-rc5rev.pd
“Detecting passive content leaks and pollution in android applications,” in Proceedings of the Network and Distributed System Security Symposium , 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
