Sunteți pe pagina 1din 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/308811037

An encryption protocol for end-to-end secure transmission of SMS

Conference Paper · March 2015


DOI: 10.1109/ICCPCT.2015.7159471

CITATIONS READS
17 557

2 authors, including:

Panchami Vijayan
Toc H Institute of Science and Technology
10 PUBLICATIONS   45 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Panchami Vijayan on 15 May 2018.

The user has requested enhancement of the downloaded file.


2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

An Encryption Protocol for End-to-end Secure


Transmission of SMS
Minta Thomas Panchami V
PG Student,CSE Assistant Professor ,CSE
Toc-H Institute of Science and Technology Toc-H Institute of Science and Technology
Ernakulam,India.Pin-682313 Ernakulam,India.Pin-682313
Email:mintathomasj7@gmail.com Email: panchamam036@gmail.com

Abstract-Short Message Service (SMS) is a process is exchanged using SMS. The data can be protected
of transmission of short messages over the using cryptography.
network. SMS is used in daily life applications
including mobile commerce, mobile banking, and ”Cryptography” derives from the Greek word kruptos
so on. It is a robust communication channel to which means ”hidden”. Cryptography is an area of
transmit information. SMS pursue a store and computer science which is developed to provide
forward way of transmitting messages. The security for the senders and receivers to transmit and
private information like passwords, account receive confidential data through an insecure channel.
number, passport number, and license number Cryptography [1] ensures that the message should be
are also send through message. The traditional sent without any alterations and only the authorized
messaging service does not provide security to the person can be able to open and read the message.
message since the information contained in the
SMS transmits as plain text from one mobile The plain text is the original message that a person
phone to other. This paper explains an efficient wishes to send to other user. The Cipher text is the
encryption protocol for securely transmitting the message that cannot be understood by others. A key
confidential SMS from one mobile user to other can be a numeric or alpha numeric text or a special
which serves the cryptographic goals like symbol. Encryption is the process of converting the
confidentiality, authentication and integrity to the plaintext into cipher text using a key. Decryption is
messages. The Blowfish encryption algorithm the reverse process of encryption in which the
gives confidentiality to the message, the EasySMS original message is retrieved from the cipher text.
protocol is used to gain authentication and MD5
hashing algorithm helps to achieve integrity of the The encryption and decryption process is given in
messages. Blowfish algorithm utilizes only less Fig. 1. The original message or the plain text is the
battery power when compared to other encryption input to the encryption process which encrypts the
algorithms. The protocol prevents various attacks, plaintext using a key and produces a cipher text to be
including SMS disclosure, replay attack, man-in- transmitted. The input cipher text is passed through
the middle attack and over the air modification. the decryption process which decrypts the cipher text
using the same key as that of encryption at the
Index terms: Cryptography, Encryption, Secure decryption end. Finally the original plaintext message
Transmission, Symmetric Encryption, is obtained.
Asymmetric Encryption.

I. INTRODUCTION

Mobile phones have become pervasive and


ubiquitous in the current environment around the Fig. 1: Encryption and Decryption Process
world. Short Message Service (SMS) or text
messaging is one of the services that have been very A. Goals of cryptography
popular in the mobile phones. SMS has become one Cryptography provides some security services that
of the fastest and strong communication channels to ensure adequate security of the systems or of data
transmit the information. It is crucial to protect the transfers. Following are the main cryptographic goals
content of the message when confidential information [2]:

978-1-4799-7075-9/15/$31.00©2015 IEEE
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

• Confidentiality: Assures that private or system is described in Section IV. The


confidential information is not made implementation is described in Section V. The
available or disclosed to unauthorized conclusion is described in Section VI describes.
individuals.
• Integrity: Assures that information and II. RELATED WORKS
programs are changed only in a specified
and authorized manner. The transmission of an SMS in the network is not
• Authentication: Assurance that the secure therefore it is desirable to secure SMS by
communicating entity is the one that it additional encryption process. To provide security to
claims to be. the transmitted messages various authors have
• Non-repudiation: Provides protection proposed different techniques. In [4] an
against denial by one of the entities involved implementation of a public key cryptosystem for
in a communication of having participated in SMS in a mobile phone network has been discussed
all or part of the communication. but the security analysis of the protocol has not
• Access control: The prevention of discussed. In [5] a secure SMS is considered to
unauthorized use of a resource. provide mobile commerce services which is based on
public key infrastructure.
B. Classification of Cryptography
The cryptographic encryption can be classified into A framework Secure Extensible and Efficient SMS
two categories- Symmetric key cryptography and (SEESMS) [6] uses public key cryptography to
Asymmetric key cryptography. communicate between two peers. SEESMS is a
software framework written in Java which allows two
• Symmetric Key Cryptography peers to exchange encrypted and digitally signed
In symmetric key cryptography, a single key SMS messages. The communication between peers is
is used for both encryption and decryption. secured by using public key cryptography. A security
The sender uses the secret key to encrypt the Protocol called SMSSec in [7] uses both symmetric
plaintext and sends the ciphertext to the and asymmetric encryption algorithms for
receiver. The receiver applies the same communication. SMSSec has a two-phase protocol
secret key to decrypt the message and with the first handshake using asymmetric
recover the plaintext. Symmetric key cryptography which occurs only once, and a more
cryptography is also called secret key efficient symmetric nth handshake which is used
cryptography or private key cryptography. more dominantly.

• Asymmetric Key Cryptography A new system called Secret Short Message Service
In asymmetric key cryptography, two (SSMS) [8] was proposed to secure SMS messages
different keys are used for encryption and transmission on mobile network. Their system is able
decryption-a public key and a private key. It to protect the private data saved on mobile phone.
transforms plaintext into ciphertext using AES Rijndeal is used to perform encryption. Secret
public keys and an encryption algorithm. key is embedded in cipher text using hash. It is used
Using the private key and a decryption to encrypt SMS message. Message decryption also
algorithm, the plaintext is recovered from uses the same secret key. The encrypted secret key
the ciphertext. Asymmetric key is used for encryption and decryption.
cryptography is also known as public key
cryptography. There are lots of encryption algorithms available in
cryptography area. A study [1] is conducted on
Symmetric Encryption Algorithm [3] runs faster symmetric key algorithms and asymmetric key
when compared to Asymmetric key algorithms. Also algorithms. It is found that symmetric key algorithms
the memory requirement of Symmetric algorithm is run faster than asymmetric key algorithms such as
lesser as compared to asymmetric. RSA and the memory requirement of symmetric
algorithms is lesser than asymmetric encryption
algorithms. The performance of asymmetric
C. Paper organization algorithm is relatively low as compared to symmetric
This paper is organized as follows. The related work key encryption. Most asymmetric algorithms depend
is described in Section II. The problem definition is on the properties of hard problems in mathematics.
described in Section III describes. The proposed The asymmetric encryption works slower as
compared to symmetric encryption.
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

while the MD5 and SHA-1 algorithm are the two


In the paper [1] the comparisons of symmetric key most commonly used algorithms.
algorithms like DES, 3DES, AES, Blowfish are
performed. On the basis of key size and security the Message digest 5 or MD5 [15] [16] is one of
supremacy is for Blowfish algorithm over DES [9], message-digest algorithm that was developed by Ron
AES and Triple DES. The F function of Blowfish Rivest in 1991. MD5 algorithm takes an input in any
algorithm provides a high level of security to encrypt of length and produces an output in the form of a
the plaintext data. Also the Blowfish algorithm runs digest with the length of 128 bits. Input received by
faster than other popular symmetric key encryption this algorithm will be processed in a block size of
algorithms. 512 bits, which will then be divided into 16 sub-
blocks, each is 32 bits. SHA [2] [17] was developed
A study in [10] [11] is conducted for different by the National Institute of Standards and
popular secret key algorithms such as DES, 3DES, Technology (NIST) and published as a Federal
AES, and Blowfish. They were implemented, and Information Processing Standards (FIPS 180) in
their performance was compared by encrypting input 1993. SHA-1 input can accept a maximum of less
files of varying contents and sizes. The results than 64 bits, and 160 bits long output. SHA-1
showed that Blowfish had a very good performance processing input in a block size of 512 bits, and then
compared to other algorithms. Also it showed that divide it into 16 sub block that each measuring 32 bit.
AES had a better performance than 3DES and DES.
It also shows that 3DES has almost 1/3 throughput of The advantages of MD5 [18] [19] is that it is easy to
DES, or in other words it needs 3 times than DES to compute the hash value for any given message,
process the same amount of data. infeasible to find a message that has a given hash,
infeasible to modify a message without changing its
A study in [12] [13] is conducted on the performance hash, infeasible to find two different messages with
evaluation of selected symmetric encryption the same hash. It requires only less memory and low
algorithms (AES, DES, 3DES, RC2, RC6, Blowfish) processing time. All these advantages make it
on power consumption for wireless devices. It is suitable over other hashing algorithms and to be used
found that in case of encryption time, throughput, and in a mobile platform. From the literature survey it can
power consumption for encryption and decryption be concluded that the best suitable algorithm for
Blowfish has better performance than other encrypting the message in mobile phone is the
encryption algorithms, followed by RC6. AES is Blowfish algorithm. This is due to its encryption
faster than 3DES, DES, and RC2. DES encrypts and speed, high throughput, low energy consumption and
decrypts data faster than 3DES and RC2. 3DES is saving of battery power. Also MD5 is suitable for
faster than RC2. RC2 turns out to be the slowest checking the errors that may occur during the
method when the data being encrypted is small. transmission.

A study [14] shows that Blowfish algorithm is a III. PROBLEM DEFINITION


symmetric key block cipher that uses a 64 bit block
size and variable key length. It takes a variable-length The main purpose of SMS is to deliver text messages
key from 32 bits to 448 bits. Blowfish is one of the from one mobile device to another. But it is not safe
fastest block ciphers which have developed to date. and secure when confidential information is
No attack is known to be successful against it. The transmitted using the typical SMS services. It is
superiority of Blowfish algorithm with other important to avoid the SMS content from being
algorithms is in terms of the throughput, processing illegally interrupted by illegal sources. Several
time and power consumption. Blowfish algorithm has cryptography techniques are used to overcome the
high throughput. More the throughput, more the SMS security problems and satisfy the security
speed of the algorithm less will be the power requirements. The traditional SMS service does not
consumption. provide information security of the message being
sent over the network. The existing system makes use
The Hash function [2] is a function that maps any of AES algorithm for the process of encryption. From
message with the variety of length, into a fixed- the related works it is clear that AES algorithm has
length hash value, called a hash code. Hash code is a low speed, less throughput, consumes more energy
function of all bits in any message, which is used to and reduces battery power. The existing system only
detect errors of the message. One bit changes in ensures confidentiality and authentication of the
original message will produce a different hash code. messages that are sending over the network.
There are various types of hash function algorithms,
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

IV. PROPOSED WORK

The proposed work is a combination of encryption


algorithm, hashing algorithm and a protocol for
secure end-to-end transmission of SMS. The existing
system [20] uses AES encryption algorithm which
has less throughput, low speed, consumes more
energy and reduces battery power. Since the platform
of proposed work is mobile phone the battery power
is of high importance. The main objective of the
project is to securely transmit SMS from one mobile
to another. Also to develop a system which encrypts
more faster, high throughput, reduces the energy
consumption and saves battery power which provide
confidentiality, authentication and integrity to the
Fig. 2: The Protocol
messages. The protocol prevents various attacks,
including SMS disclosure, replay attack, man-in-the
On the sender side, the hash code of the message or
middle attack and over the air modification.
plain text (P) is first calculated using MD5 algorithm.
The hash code is appended with the message and is
The algorithms used in the project are EasySMS
encrypted using Blowfish algorithm. The key used
protocol, Blowfish encryption algorithm and MD5
for encryption is received from the authentication
hashing algorithm. The protocol aims to achieve
server. The cipher message (Y) thus obtained can be
authentication, the Blowfish encryption algorithm is
transmitted over the network. On the receiver side,
used to achieve confidentiality and MD5 is used to
the cipher message is decrypted using Blowfish
achieve integrity to the message. The protocol
algorithm where the message (P) and hash code is
includes two Mobile Stations (MS1 and MS2),
obtained. The hash code of the message P is
Authentication Server (AS) and a certified authority
calculated and is compared with the received hash
(CA). The AS stores all the symmetric keys shared
code. If both are same then no error has occurred in
between AS and the respective MS. CA stores all the
the transmission.
information related to the mobile subscribers. We
assume that every subscriber has to register his/her
mobile number with CA entity and only after the
verification of identity, the SIM card gets activated
by this entity. Thus, this entity is responsible to
validate the identity of the subscribers. We also
assume that a symmetric key is shared between the
AS and the CA which provides the proper security to
all the transmitted information between AS and CA
[20].

First, the mobile user who wants to send the SMS


(say MS1) transmits an initial request to other mobile
Fig. 3: Secure Communication
user (say MS2) for the connection. On receiving the
message MS2 forwards request to AS. When the AS
receives a message from the MS2 the message is
The sender and receiver are the two mobile users.
forwarded to CA. The CA checks the validity of both
The battery power and throughput have a vital role
entities and sends the reply back to the AS. On
since the platform used is mobile phone. So we opted
receiving the message from the CA, if the AS finds
Blowfish algorithm for encrypting the message.
any of the entities is invalid then the connection is
Blowfish encryption algorithm has high throughput,
simply terminated and MS1 needs to send a fresh
reduces the energy consumption and saves battery
connection request. The AS sends the secret key to
power. The MD5 algorithm checks whether any
the MS1 and MS1 sends an acknowledgment back to
alteration or modification of the message has
AS. The AS also sends the secret key to the MS2 to
occurred during the transmission. Hence the system
which an acknowledgment is send back to the AS.
proves to transmit the messages securely between
Hence MS2 confirms the connection with MS1 and
mobile users.
now secure communication can be taken place.
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

V. IMPLEMENTATION [2] William Stallings, Cryptography and Network


Security Principles and Practices Fourth Edition.
The proposed work aims to achieve the cryptographic [3] Ketu File white papers, Symmetric vs
goals by making use of protocol and algorithms as Asymmetric Encryption, a division of Midwest
discussed in proposed work. The overall system can Research Corporation.
be divided into three modules, namely, User Profile, [4] M. Hassinen, Java based public key infrastructure
Authentication Server and Secure Communication. for SMS messaging,in Proc. 2nd ICTTA, 2006, pp.
8893.
A. User Profile [5] S. Wu and C. Tan, A high security framework for
When a mobile user wants to send a confidential SMS,in Proc. 2nd Int. Conf. BMEI, 2009, pp. 16.
information to another user, the user requests for a [6] A. De Santis,G. Cattaneo, M. Cembalo, F.
connection to the authentication server. The request Petagna, and U. F. Petrillo, An extensible framework
includes the MAC or timestamp of the message. The for efficient secure SMS,in Proc. Int. Conf. CISIS,
authentication server forwards the requests to 2010, pp. 843850.
certified authority where all the mobile subscriber [7] J. L.-C. Lo, J. Bishop, and J. H. P. Eloff, SMSSec:
details are stored. If it is a valid user, then the user is An end-toend protocol for secure SMS, Computer
connected to server. Security, vol. 27, nos. 56,pp. 154167, 2008.
[8] M. Toorani and A. Shirazi, SSMS: A secure SMS
B. Authentication Server messaging protocol for the m-payment systems,in
An authentication server (AS) stores the keys shared Proc. IEEE ISCC, Jul. 2008, pp. 700705.
between the authentication server and the users. On [9] Tingyuan Nie, Chuanwang Song, Xulong Zhi,
conforming the connection between the sender and Performance Evaluation of DES and Blowfish
receiver the authentication server sends the secret key Algorithms,IEEE, 2010.
to both users. The encryption takes place through this [10] Diaa Salama Abdul Minaam, Hatem M. Abdual-
secret key. Kader, and Mohiy Mohamed Hadhoud, Evaluating
the Effects of Symmetric Cryptography Algorithms on
C. Secure Communication Power Consumption for Different Data
The sender calculates the hash value of the message Types,International Journal of Network Security,
using MD5 and encrypts the message using the Vol.11, No.2, PP.7887, Sept. 2010.
Blowfish algorithm. The key for encryption is send [11] Najib A. Kofahi, Turki Al-Somani and Khalid
by the authentication server. On receiving the Ai-Zamil, Performance Evaluation of Three
message the receiver decrypts the ciphered message Encryption/Decryption Algorithms,IEEE,2010.
and calculates the hash. The error detection is [12] Diaa Salama,Hatem Abdual Kader, and Mohiy
performed by comparing the received and calculated Hadhoud, Wireless Network Security Still Has no
hash. Clothes,International Journal on Computer Science
and Engineering (IJCSE),Vol. 4 No. 05 May 2012.
VI. CONCLUSION [13] P. Ruangchaijatupon, P. Krishnamurthy,
The SMS are being used in many daily life Encryption and Power Consumption in Wireless
applications. But when we send an SMS from one LANs-N, The Third IEEE Workshop on Wireless
mobile phone to other, the information contained in LANs - September 27-28, 2001- Newton,
the SMS transmit as plain text. The paper explains an Massachusetts.
efficient encryption protocol which includes the [14] Pratap Chnadra Mandal, Superiority of Blowfish
Blowfish and MD5 algorithms that aims to achieve Algorithm,International Journal of Advenced
confidentiality and integrity respectively. The Research in Computer Science and Software
EasySMS protocol provides authentication. The Engineering 2(9),September - 2012, pp. 196-201.
proposed work aims to achieve high throughput, [15] R. Rivest, The MD5 Message-Digest
encrypts more faster and saves battery power as it Algorithm,Network Working Group, 1992.
makes use of energy efficient Blowfish algorithm. [16] Zhang Qing, Iterative Hashing Algorithm Base
Hence the SMS can be securely transmitted from one on MD5, Journalon Computer Engineering,vol.37(18)
mobile to another. 124-126,2011.
[17] A. A. Pamungkas, Implementasi Algoritma
REFERENCES Sistem Kriptografi MD5,SHA-1 dan RC4 pada
[1] Monika Agrawal, A Comparative Survey on Aplikasi Mobile Internet Berbasis Java,Journal
Symmetric Key Encryption Techniques, International Penelitian dan Pengembangan Telekomunikasi, vol.
Journal on Computer Science and Engineering 11, no. 1, June 2006.
(IJCSE),Vol. 4 No. 05 May 2012.
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

[18] Zhang Shaolan, Xing Guobo, Yang Yixian,


Improvement to MD5 and Security Analysis, Journal
on Computer Application,vol.29(4):947- 949,2009.
[19] Anak Agung Putri Ratna and Ahmad Shaugi,
Analysis and Comparison of MD5 and SHA-1
Algorithm Implementation in Simple-O
Authentication based Security System,IEEE Quality
in Research 2013.
[20] Neetesh Saxena and Narendra S. Chaudhari,
EasySMS: A Protocol for End-to-End Secure
Transmission of SMS,IEEE Transactions on
Information Forensics and Security, Vol. 9, No. 7,
July 2014.

View publication stats

S-ar putea să vă placă și