Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

نویسندگان

  • Teddy Mantoro
  • Andri Zakariya
چکیده

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; email is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, email has no integrity protection so the body can be undectected altered in transit or on the e-mail server. Email also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment

Information security is one of the major concerns while transferring some information publicly. With the advancement in the communication medium there are chances of more threats in the communication system. In this work, we have focused on the threats associated with SMS (Short Message Service) Communication in android environment. The work is about to define an effective symmetric cryptograph...

متن کامل

Hybrid Framework for Effective Mobile Web Service Provisioning

Due to the advancements in smart mobile phone's capabilities, web technologies and wireless technologies, it is changing the role of mobile devices as a web service consumer to a web service provider. The future of mobile web service provisioning is more exciting because day by day Smartphone users are increasing. In future it is called as Mobile Ubiquitous computing because the smart phone pro...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...

متن کامل

A Survey on Security and Privacy Challenges in Mobile Grid Computing

The security is essential for all the applications on network. For providing the security to many applications on the network, number of mechanism are used. Grid computing is believed to be ultimate solution for meeting the increasing computation needs of the organizations. At present major focus in Grid computing is to improve the performance of the grid. However, user running an application o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012