Abstract:Messages sent using the default Short Message Service (SMS) application have to pass the SMS Center (SMSC) to record the communication between the sender and recipient. Therefore, the message security is not guaranteed because it may read by irresponsible people. This research proposes the RC4 stream cipher method for security in sending SMS. However, RC4 has any limitation in the Key Scheduling Algorithm (KSA) and Pseudo Random Generation Algorithm (PRGA) phases. Therefore, this research developed RC4 with a … Show more
“…For security in IoT applications, such as blockchain, this study provided a solution for blockchains in smart cities to enhance the chain speed and security and to optimize smart contracts to reduce the cost and implementation time [32]. For further research on the authentication using RFID and Near Field-Communication (NFC) and the implementation in the field of healthcare to maintain security of medical data and management, please refer to [33][34][35][36].…”
Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Irregular Clocking KEYstream generator—version 2-(MICKEY 2.0) cipher. This study aims to obtain a scaled-down version of the MICKEY 2.0 cipher by modifying its internal state design via reducing shift registers and modifying the controlling bit positions to assure the ciphers’ pseudo-randomness. We measured these changes using the National Institutes of Standards and Testing (NIST) test suites, investigating the speed and power consumption of the proposed scaled-down version named MICKEY 2.0.85. The (85) refers to the new modified bit-lengths of each MICKEY 2.0 register. The results show that it is faster, requires less power, and needs fewer GEs. The proposed variant will enhance the security of applications, such asRadio-frequency identification (RFID) technology, sensor networks, and in Internet of things (IoT) in general. It also will enhance research on the optimization of existing lightweight cryptosystems.
“…For security in IoT applications, such as blockchain, this study provided a solution for blockchains in smart cities to enhance the chain speed and security and to optimize smart contracts to reduce the cost and implementation time [32]. For further research on the authentication using RFID and Near Field-Communication (NFC) and the implementation in the field of healthcare to maintain security of medical data and management, please refer to [33][34][35][36].…”
Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Irregular Clocking KEYstream generator—version 2-(MICKEY 2.0) cipher. This study aims to obtain a scaled-down version of the MICKEY 2.0 cipher by modifying its internal state design via reducing shift registers and modifying the controlling bit positions to assure the ciphers’ pseudo-randomness. We measured these changes using the National Institutes of Standards and Testing (NIST) test suites, investigating the speed and power consumption of the proposed scaled-down version named MICKEY 2.0.85. The (85) refers to the new modified bit-lengths of each MICKEY 2.0 register. The results show that it is faster, requires less power, and needs fewer GEs. The proposed variant will enhance the security of applications, such asRadio-frequency identification (RFID) technology, sensor networks, and in Internet of things (IoT) in general. It also will enhance research on the optimization of existing lightweight cryptosystems.
“…This technology ensures a safe and dependable information network. Research [29] proposed in-app encrypted texts using the RC4 algorithm as the secure method of delivering text. RC4 does, though, incorporate the Key Scheduling Algorithm (KSA) as well as the Pseudo-Random Generation Algorithm (PRGA).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The suggested method's performance is measured using encoding and deciphering times and based on the correlation values. Depending on the information, it appears that all amounts of the transmitted SMS words influence the cryptographic operations times, with a maximum correlation of 0.00482 [29]. In [30] the survey is conducted on RC4 to enhance the RC4 and remove the weakness of RC4.…”
: Digital communication is becoming an integral component of contemporary society and the use of mobile devices is increasing faster than ever. The function of message communication is becoming more popular as for mobile phone users, a short messaging service (SMS) requires an extremely high level of security. Any SMS that enters a person's smartphone must be considered a private affair, with privacy and security safeguarded. This research study found a novel Deoxyribonucleic acid (DNA) Cryptography method that uses a dynamic DNA sequence table to increase security. Cryptography is a popular approach for ensuring the confidentiality of a message. This paper proposed an Efficient Cryptographic Scheme for SMS (ECSS) algorithm to protect texts received from an Android smartphone. ECSS-based encryption has been identified as a novel method of securing information in the form of DNA molecules that employ DNA strands to conceal the information. This Paper provides the DNA cryptography approach for encrypting and decrypting plain texts in this work. The primary goal of ECSS cryptography is to guarantee secrecy when people transfer data across a network. This paper examines DNA Crypto, the distinction between classical cryptography and DNA Data encryption. An Android-based app is created to perform the proposed technique and the results show that the algorithms produce a consistent encryption result in which the length of the message before encryption is always the same as the length of the message after decryption. The suggested security solution has the potential to greatly improve the security of mobile communication. This Paper also provides experimental results for our chat application performance, such as received text message correctness, cipher text, average encryption time and average decryption time. According to the findings/results of this study, the speed of average encryption and decryption of the description is roughly 0.011 and 0.037 sec and prevents plaintext and dictionary attacks.
“…Statistics of communication protocols on the web show that the RC4 algorithm secures 50% of TLS traffic. The RC4 algorithm is composed of the Key Scheduling Algorithm KSA that is used to initialize the S-box using key of variable length and Pseudo Random Generation Algorithm PRGA to generate bytes of keystream [7].…”
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.