SMS Security by Elliptic Curve and Chaotic Encryption Algorithms

Authors

  • Ziadoon W. Salman Ministry of Education, Directorate of Education Rusafa-2, 10001 Baghdad, IRAQ. https://orcid.org/0000-0002-1748-0907
  • Hind Ibrahim Mohammed Al-Mukdad College of Education, University of Diyala, 32001 Diyala, IRAQ. https://orcid.org/0000-0001-7679-7325
  • Ayman Mohammed Enad Department of Mathematics and Computer Science, Faculty of science, Alexandria University, Alexandria, Egypt.

DOI:

https://doi.org/10.23851/mjs.v34i3.1318

Keywords:

Elliptic curve algorithm, Encryption, Decryption, Throughput, Security, Chaos theory

Abstract

Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.

 

Downloads

Download data is not yet available.

Author Biography

  • Hind Ibrahim Mohammed, Al-Mukdad College of Education, University of Diyala, 32001 Diyala, IRAQ.

     

     

References

Shoewu, O., and Segun O. Olatinwo. "Securing Text Messages using Elliptic Curve Cryptography Orthogonal Frequency Division Multiplexing." Pac. J. Sci. Technol.Vol.14,nu.2,November 2013.

Sridhar C. Iyer, R.R.Sedamkar,ShiwaniGupta"Multimedia Encryption using Hybrid Cryptographic Approach" International Journal of Computer Applications, 2014, pp. 0975 - 8887.

Fang Yuan, Guang-Yi Wang, and Bo-zhen Cai. "Android SMS encryption system based on chaos." 2015 IEEE 16th International Conference on Communication Technology (ICCT). IEEE, 2015, pp. 856 - 862.

CrossRef

BHIMRAO PATIL."SMS SECURITY USING RC4 & AES." Indian J. Sci. Res 11.1,2015, pp. 034-038.

RashmiRamesh Chavan, and Manoj Sabnees."Secured mobile messaging." Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on. IEEE, 2012, pp. 1036-1043

CrossRef

Muhammad Murad Khan, Majid Bakhtiari, Saeid Bakhtiari. "An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA." 2013 13th International Conference on Intelligent Systems Design and Applications. IEEE, 2013, pp. 115-120.

Sri Rangarajan, N.Sai Ram, N. Vamshi Krishna. "Securing SMS using Cryptography." International Journal of Computer Science and Information Technologies (IJCSIT) 4.2 ,Vol. 4 (2), 2013, pp. 285-288.

M. Shanmugasundaram, and R. Shanmugasundaram. "Elliptic Curve Cryptography (ECC) for Security in Mobile Communication." European Journal of Advances in Engineering and Technology 1.2 ,2014,pp.93-101.

Nimmya Unnikrishnan,and Divya K. V."End To End Secure SMS Communication: A Literature Survey.", Vol. 4, 2015, pp, 2347 - 8616.

Riaz, Muhammad Noman, and Adeel Ikram. "Development of a secure SMS application using advanced encryption standard (AES) on android platform." Int. J. Math. Sci. Comput.(IJMSC) 4.2 (2018): 34-48.

CrossRef

Reaves, Bradley, et al. "Characterizing the security of the SMS ecosystem with public gateways." ACM Transactions on Privacy and Security (TOPS) 22.1 (2018): 1-31.

CrossRef

Kim, BoSung, and JooSeok Song. "Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2019 (2019): 1-16.

CrossRef

Srinivas, Jangirala, and Ashok Kumar Das. "Lightweight Security Protocols for Blockchain Technology." Cyber Defense Mechanisms. CRC Press, 2020. 131-156.

CrossRef

Shrestha, Rakesh, et al. "Evolution of V2X communication and integration of blockchain for security enhancements." Electronics 9.9 (2020): 1338.

CrossRef

SYLFANIA, Dwi Yuny, Fransiskus Panca JUNIAWAN, and Harrizki Arie PRADANA. "Blowfish-RSA Comparison Analysis of the Encrypt Decrypt Process in Android-Based Email Application." Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Atlantis Press, 2020.

CrossRef

Chaeikar, Saman Shojae, Saeed Yazdanpanah, and Nakisa Shoja Chaeikar. "Secure SMS transmission based on social network messages." International Journal of Internet Technology and Secured Transactions 11.2 (2021): 176-192.

CrossRef

Downloads

Key Dates

Published

30-09-2023

Issue

Section

Original Article

How to Cite

[1]
Z. W. Salman, H. I. . Mohammed, and A. M. . . Enad, “SMS Security by Elliptic Curve and Chaotic Encryption Algorithms”, Al-Mustansiriyah Journal of Science, vol. 34, no. 3, pp. 56–63, Sep. 2023, doi: 10.23851/mjs.v34i3.1318.

Similar Articles

1-10 of 74

You may also start an advanced similarity search for this article.