Skip to main content

A Novel Encryption Scheme for Secure SMS Communication

  • Conference paper
  • First Online:
Advances in Electronics, Communication and Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 443))

  • 1882 Accesses

Abstract

Security is a challenging issue in today’s digital world and for this, role of cryptography is significant. Cryptography secures data and information using an encryption algorithm and keys. There is always demand for a stronger encryption algorithm that would be very hard or impossible to crack without valid keys so that the privacy of intended sender and receiver information can be protected from hackers. This paper suggests a novel encryption scheme for SMS communication that uses multiple rounds of encryption to provide better privacy to the transmitted message against unauthorized access. Message integrity and authentication have been ensured by addition of authentication characters to the message. Keeping in mind the limited memory and processing capacity of mobile devices, the algorithm has been kept simpler and at the same time the strength of the scheme has been ensured with a stronger key and better mix of confusion and diffusion principles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw Hill Publishing Company Limited, New Delhi

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 4th edn. Prentice Hall (2006)

    Google Scholar 

  3. Gosh, K., Mishra, M.: Elliptic key cryptography and time bound key management. Anvesa 10(1&2), 34–40 (2015)

    Google Scholar 

  4. Banerjee, S., Roy, U.: Secure SMS communication in android based system with two stage protection. Int. J. Comput. Sci. Mob. Comput. 4(6), 1057–1064 (2015)

    Google Scholar 

  5. Chand, N., Bhattacharyya, S.: A novel approach for encryption of text message using palyafair cipher 6 by 6 matrix with four iteration steps. Int. J. Eng. Sci. Innovative Technol. (IJESIT) 3(1), 478–484 (2014)

    Google Scholar 

  6. Aftab Alam, A., Shah Khalid, B., Muhammad Salam, C.: A modified version of playfair cipher using 7 × 4 matrix. Int. J. Comput. Theor. Eng. 5(4), 626–628 (2013)

    Google Scholar 

  7. Shrivastava, G., Chouhan, M., Dhawan, M.: A modified version of Extended playfair cipher (8 × 8). Int. J. Eng. Comput. Sci. 2(4), 956–961 (2013)

    Google Scholar 

  8. Dhenakaran, S.S., Llayaraja, M.: Extension of playfair cipher using 16 × 16 matrix. Int. J. Comput. Appl. 48(7), 37–41 (2012)

    Google Scholar 

  9. Goyal, K., Klinger, S.: Modified caeser cipher for better security enhancement. Proc. Int. J. Comput. Appl. 73(3), 26–31 (2013)

    Google Scholar 

  10. Almasari, O., Rmatjani, H.: Introducing encryption algorithm based on IDEA. Int. J. Sci. Res. (IJSR) 2(9), 334–339 (2013)

    Google Scholar 

  11. Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Glob. J. Comput. Sci. Technol. Netw. 13(15) (2013)

    Google Scholar 

  12. Akash, H.P., Adarsh, K., Chandrasekhar, S.: A secure encryption technology based on advanced hill cipher for public key encryption. IOSR J. Comput. Eng. 11(2), 10–14 (2013)

    Article  Google Scholar 

  13. Sctmeier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Counterpane Systems, 730 Fair Oaks Ave, Oak Park, IL 60302 (2005)

    Google Scholar 

  14. Nanda, A.K., Awasti, L.K.: A proposal for SMS security using NTRU cryptosystem. In: Proceeding to 9th International Conference, pp. 706–718. Springer (2013)

    Google Scholar 

  15. Pavitra, S., Ramadevi, E.: Performance evolution of symmetric algorithm. J. Glob. Res. Comput. Sci. 3(8), 43–45 (2012)

    Google Scholar 

  16. Nakashima, T., Ukamoto, T.: Natural science report. Ochanomizu Univ. 57(1), 37–55 (2006)

    Google Scholar 

  17. Pointcheval, D., Okamoto, T.: REACT: rapid enhanced asymmetric cryptosystem transform. In: Proceeding of Cryptographer’s Track at RSA Conference, San Francisco, California, Springer, pp. 159–175 (2001)

    Google Scholar 

  18. Frosen, J.: Practical Cryptosystem and Their Strength. Department of Computer Science, Helsinki University of Technology

    Google Scholar 

  19. Gunasundari, T., Elangovan, K.: Symmetric Key Cryptography: Current Trends. Int. J. Comput. Sci. Mob. Appl. 2(2), 78–83 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minati Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malla, A., Sahu, P., Mishra, M. (2018). A Novel Encryption Scheme for Secure SMS Communication. In: Kalam, A., Das, S., Sharma, K. (eds) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, vol 443. Springer, Singapore. https://doi.org/10.1007/978-981-10-4765-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4765-7_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4764-0

  • Online ISBN: 978-981-10-4765-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics