Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices
نویسندگان
چکیده
One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; email is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, email has no integrity protection so the body can be undectected altered in transit or on the e-mail server. Email also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.
منابع مشابه
A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment
Information security is one of the major concerns while transferring some information publicly. With the advancement in the communication medium there are chances of more threats in the communication system. In this work, we have focused on the threats associated with SMS (Short Message Service) Communication in android environment. The work is about to define an effective symmetric cryptograph...
متن کاملHybrid Framework for Effective Mobile Web Service Provisioning
Due to the advancements in smart mobile phone's capabilities, web technologies and wireless technologies, it is changing the role of mobile devices as a web service consumer to a web service provider. The future of mobile web service provisioning is more exciting because day by day Smartphone users are increasing. In future it is called as Mobile Ubiquitous computing because the smart phone pro...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملElliptic Curve Cryptography in Securing Networks by Mobile Authentication
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...
متن کاملA Survey on Security and Privacy Challenges in Mobile Grid Computing
The security is essential for all the applications on network. For providing the security to many applications on the network, number of mechanism are used. Grid computing is believed to be ultimate solution for meeting the increasing computation needs of the organizations. At present major focus in Grid computing is to improve the performance of the grid. However, user running an application o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012