SMS Security by Elliptic Curve and Chaotic Encryption Algorithms
Keywords:Elliptic curve algorithm, Encryption, Decryption, Throughput, Security, Chaos theory
Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.
Shoewu, O., and Segun O. Olatinwo. "Securing Text Messages using Elliptic Curve Cryptography Orthogonal Frequency Division Multiplexing." Pac. J. Sci. Technol.Vol.14,nu.2,November 2013.
Sridhar C. Iyer, R.R.Sedamkar,ShiwaniGupta"Multimedia Encryption using Hybrid Cryptographic Approach" International Journal of Computer Applications, 2014, pp. 0975 - 8887.
Fang Yuan, Guang-Yi Wang, and Bo-zhen Cai. "Android SMS encryption system based on chaos." 2015 IEEE 16th International Conference on Communication Technology (ICCT). IEEE, 2015, pp. 856 - 862.
BHIMRAO PATIL."SMS SECURITY USING RC4 & AES." Indian J. Sci. Res 11.1,2015, pp. 034-038.
RashmiRamesh Chavan, and Manoj Sabnees."Secured mobile messaging." Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on. IEEE, 2012, pp. 1036-1043
Muhammad Murad Khan, Majid Bakhtiari, Saeid Bakhtiari. "An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA." 2013 13th International Conference on Intelligent Systems Design and Applications. IEEE, 2013, pp. 115-120.
Sri Rangarajan, N.Sai Ram, N. Vamshi Krishna. "Securing SMS using Cryptography." International Journal of Computer Science and Information Technologies (IJCSIT) 4.2 ,Vol. 4 (2), 2013, pp. 285-288.
M. Shanmugasundaram, and R. Shanmugasundaram. "Elliptic Curve Cryptography (ECC) for Security in Mobile Communication." European Journal of Advances in Engineering and Technology 1.2 ,2014,pp.93-101.
Nimmya Unnikrishnan,and Divya K. V."End To End Secure SMS Communication: A Literature Survey.", Vol. 4, 2015, pp, 2347 - 8616.
Riaz, Muhammad Noman, and Adeel Ikram. "Development of a secure SMS application using advanced encryption standard (AES) on android platform." Int. J. Math. Sci. Comput.(IJMSC) 4.2 (2018): 34-48.
Reaves, Bradley, et al. "Characterizing the security of the SMS ecosystem with public gateways." ACM Transactions on Privacy and Security (TOPS) 22.1 (2018): 1-31.
Kim, BoSung, and JooSeok Song. "Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2019 (2019): 1-16.
Srinivas, Jangirala, and Ashok Kumar Das. "Lightweight Security Protocols for Blockchain Technology." Cyber Defense Mechanisms. CRC Press, 2020. 131-156.
Shrestha, Rakesh, et al. "Evolution of V2X communication and integration of blockchain for security enhancements." Electronics 9.9 (2020): 1338.
SYLFANIA, Dwi Yuny, Fransiskus Panca JUNIAWAN, and Harrizki Arie PRADANA. "Blowfish-RSA Comparison Analysis of the Encrypt Decrypt Process in Android-Based Email Application." Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Atlantis Press, 2020.
Chaeikar, Saman Shojae, Saeed Yazdanpanah, and Nakisa Shoja Chaeikar. "Secure SMS transmission based on social network messages." International Journal of Internet Technology and Secured Transactions 11.2 (2021): 176-192.
How to Cite
Copyright (c) 2023 Al-Mustansiriyah Journal of Science
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Articles accepted for publication in Al-Mustansiriyah Journal of Science (MJS) are protected under the Creative Commons Attribution 4.0 International License (CC BY-NC). Authors of accepted articles are requested to sign a copyright release form prior to their article being published. All authors must agree to the submission, sign copyright release forms, and agree to be included in any correspondence between MJS and the authors before submitting a work to MJS. For personal or educational use, permission is given without charge to print or create digital copies of all or portions of a MJS article. However, copies must not be produced or distributed for monetary gain. It is necessary to respect the copyright of any parts of this work that are not owned by MJS.