Journal of Software Engineering and Applications

Volume 13, Issue 3 (March 2020)

ISSN Print: 1945-3116   ISSN Online: 1945-3124

Google-based Impact Factor: 1.22  Citations  h5-index & Ranking

Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm

HTML  XML Download Download as PDF (Size: 780KB)  PP. 25-40  
DOI: 10.4236/jsea.2020.133003    1,003 Downloads   4,797 Views  Citations

ABSTRACT

The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA); integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.

Share and Cite:

Ekwonwune, E. and Enyinnaya, V. (2020) Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm. Journal of Software Engineering and Applications, 13, 25-40. doi: 10.4236/jsea.2020.133003.

Cited by

[1] Implementation of E2EE Using Python
… in Data Mining and Information Security …, 2022

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.