Introduction
SMS Sending & Receiving text messages via mobile.
Commerce.
For single message, number of characters-160 Current standard SMS-Non-secure. SMS security To protect the sensitive information.
SMS structure
SMS - communication service in
system.
SMS service hosted on -SMS
service.
SMS Center (SMSC)delivery
of text message.
Can receive or transmit SMS at
any time.
SMS packets:
SMS travels as plain text Privacy of the SMS contents cannot be guaranteed
Security vulnerabilities
Unauthorized access
Our approach: To ensure security and cost effectiveness we applied compression and encryption techniques.
Application named ComEn is developed Mobile application-Compresses the message and then
unchanged.
Requirement Specification
Hardware Requirements
CPU - Pentium III Processor
Software Requirements
Language - Java,J2ME Operating system -
or above
Mobile Processor - ARM11
WINDOWS 7/XP
Mobile Operating System -
processor 434Mhz
Symbian OS
Mobile Platform - CLDC 1.1
Nokia Symbian-60 Series mobile phone platform. The mobile application is developed using Netbeans and
For compression:
Range encoding
Dictionary method
For encryption
Data Encryption Standard(DES)
Product functions
To provide cost effective delivery of messages. To provide security and privacy for messages. Algorithms are for compression and encryption. Before sending the messages it is compressed to a permissible
limit.
Then it is encrypted using the DES encryption algorithm and
sends.
At the receiver side cipher text is decrypted and decompressed
Implementation
1.Compression
For reducing cost Minimize the length of SMS- Packing message into one. The average compression efficiency -must be more than 40
percent.
Efficiency=ratio of total to compressed. In order to pack the whole message into 1 message- users use
transparent way.
Compression/decompression mobile application is needed on
both ends.
Different compression schemes: mainly 2 categories
Dictionary method-Human Interpretive compression method
Lossless compression techniques-Range encoding
of symbol.
Each symbol of the message can then be encoded in turn Reducing the current range down to just that sub-range.
The decoder must have the same probability estimation the encoder used.
When all symbols have been encoded, merely identifying the sub-range is
falls in a sub-range.
Then the prefix used to identify the sub-range & thus transmit the
message.
2.Encryption
Mobile devices -limited computation capability. Appropriate security mechanisms needed.
unreadable.
Here we use- Data Encryption Standard(DES) for encryption.
To implement DES we make use of Bouncy castle package.
decryption.
Operates on 64 bits plain text block Key used is 56 bits and produce cipher text of 64bits. Reverse process is used in decryption using same 56bits key. DES -several substitution and permutation primitives, to
Input: T: 64 bits of clear text k1, k2, ..., k16: 16 round keys IP: Initial permutation f(): Round function Output: C: 64 bits of cipher text Left sideThree phases: 1.Initial permutation T=IP(T) 2.16 roundspermutation and substitution. 3.O/p of 16th roundswappedpreoutput C=IP-1(preoutput)
Right side:
1.
64bit keypermuted choice1ignores every 8th bitgenerates 56bit key. Subkeys for 16roundsleft circular shift and permutation.
2.
Algorithm: T' = IP(T), applying initial permutation (L0, R0) = T', dividing T' into two 32-bit parts (L1, R1) = (R0, L0 ^ f(R0, k1)) (L2, R2) = (R1, L1 ^ f(R1, k2)) ...... C' = (R16, L16), swapping the two parts C = IP-1(C'), applying Inverse initial permutation.(^=XOR operation)
Input:
R: 32-bit input data k: 48-bit round key E: Expansion permutation P: Round permutation s(): S boxes function
Algorithm:
Input:
X: 48-bit input data S1, S2, ..., S8: 8 S boxes (4 x 16 tables) Output: X' = s(X): 32-bit output data Algorithm: (X1, X2, ..., X8) = X, dividing X into 8, 6-bit parts X' = (S1(X1), S2(X2), ..., S8(X8)) Eg:011001first & last bitrowrow1 middle 4bitscolumn col 12 Substitutesvaluerow1 & col 12 90101
Screenshots
Analysis
ComEn is designed for the secure sending and receiving of messages:
The security is ensured by compression followed by
encryption.
Compression is achieved by applying two methods :
Human Interpretative Compression Range Encoding Compression methods.
methods of compression.
Same texts were given as input for the analysis. Then the text is compressed using both the algorithms, dictionary
considered better.
Efficiency of dictionary method depends on the words in library. For sentences of very long length , Range Encoding Compression
security.
Different lengths of data are given as input for analysis The original length and compressed lengths are used to find
Conclusion
ComEn is a J2Me application
encoding .
Encryption is done by DES algorithm.
security.
Confidentiality and authentication of messages even message
Future Scope
So far, our compression and encryption that is developed can be used with Nokia S60 and s40 series.
Future work is required to apply the proposed technique to mobile
References:
[1] Gobi.R, Sathya.P, Dr.E.George Dharma Prakash Raj, Sasikumar.T, ComEn- A Mobile
Device Compression and Encryption Approach, Proceedings of the International Conference on Communication and Computational Intelligence 2010.
[2] Tarek M Mahmoud, Bahgat A.Abdel-latef, Awny A.Ahmed and Ahmed M Mahfouz,
Hybrid Compression Encryption Technique for Securing SMS, International Journal of Computer Science and Security (IJCSS).
[3] P. G. V. Suresh Kumar, Nasreddin B. El. Zoghbi and Nand Kumar, "Data Compression
Compression Algorithms", International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011
[6] DES algorithm,www.wikipedia.com.