International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 A Threshold Public Key Cryptosystem to Secure SMS in the Mobile Devices K.Suresh1, K.Venkataramana2, Prof.M.Padmavathamma3 1 2 Student, Department of CSE, MTECH, KMM Institute of Technology and Science Tirupati, Andhra Pradesh, India Associative professor, Department of CSE, KMM Institute of Technology and Science Tirupati, Andhra Pradesh, India 3 Professor, Department of Computer Science, S.V.University, Tirupati Tirupati, Andhra Pradesh, India Abstract I. Introduction In this paper we propose threshold public key cryptosystem for securing SMS between mobiles using a new method of Encryption and Decryption process of asymmetric cryptography. The mobile plays an important role in the online transactions; today 89% of mobiles communicating with the corporate data and carry the sensitive data like passwords, Bank pin numbers are also stored in the mobile devices, must be secured. The encryption plays an important role in the information security. The most important aspect needed to be considered while using cryptography to SMS security is the data storage and processing capabilities of the mobile phone. So in this paper we propose new technique HP-RSA (High Performance Mobile security or mobile phone security has turned into ever more important in mobile computing. It is of meticulous concern as it relates to the security of personal and business information now stored on smart phones. Not only normal and also business personnel use smart phones as communication tools, as a means of planning and organizing their work and their private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. According to ABI Research the Mobile Security Services market will total around $1.88 billion by the end of 2013 [6]. RSA) mainly helps in reducing the decryption process All smartphones are preferred targets of attacks as time, avoids the attacks at mobile devices (insecure computers. These attacks exploit weaknesses related to data storage) and also reduces network traffic when smartphones at the time of communication like SMS, we send SMS Considering all MMS, wifi networks, and GSM. Short Message aspects in this paper proposed HPRSA provides Service (SMS) is a text message service that enables higher authentication and security to the messages users to send short messages (it includes Bank pins, shared, which can be efficiently used in small devices passwords, etc) to other users on the Global System like mobile phones. for Mobile communication (GSM) network. Keywords: between devices. Hashing, Lookup encryption, decryption, SMS. table, indexes, All SMSs passes through the Short Message Center (SMSC) similar to SMTP mail service. The SMS Centers (SMSC) is also follow the SMTP mail server ISSN: 2231-5381 http://www.ijettjournal.org Page 334 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 mechanism is to store the SMS messages before they the encryption keys. Although asymmetric encryption are forwarded to the mobile user's service provider or offers the additional advantage of simple Key another SMSC. Although the network connections distribution between the SMSC and nodes in a GSM network are encryption is not used because it is computationally usually protected by Virtual Private Network (VPN) demanding. However, today the mobile devices have tunnels, the SMS messages are stored in an qualified dramatic improvements in computing speeds unencrypted format at the SMSC. So the employees of and memory capacity, matching those of desktop SMSC are possible to read or hack them, or others computers. Advances have also been made in battery who can hack into the system, can view all the SMS technology and the energy efficiency of components, messages passing through the SMSC [7]. If an intruder thereby extending the operating life of mobile devices. manages to compromise the SMS center, the intruder So, today the mobile devices are having the efficiency can also read the SMS traffic. One of the more high for asymmetric key cryptography for sending secure profile victims of such an attack in recent years was SMS England football captain David Beckham, whose SMS cryptography HP-RSA (High performance RSA) exchange with his personal assistant Rebecca Loos reduces the number of computations than the general was intercepted and published in a tabloid [2]. Two asymmetric key cryptography RSA. employees from European phone operator mmO2 were II. Related work and and strong MMS. The encryption, new asymmetric asymmetric key dismissed for helping their friend obtain copies of his There have been several proposals up to now to secure girlfriend’s SMS messages [3]. SMS based communications on a GSM network. A For some SMS services like online bank transactions and mobile shopping etc, should requires security in terms of confidentiality, integrity, authentication and non-repudiation services which are standard for network security. Encryption provides a means of protecting sensitive communications over a public network but it imposes overhead in terms of additional computing. Mobile devices are generally faced with constraints on computational power and battery time. These constraints enforce restrictions on the amount of encryption operations that can be performed without seriously disturbing the usability of the device. Therefore, symmetric encryption is commonly used in mobile devices because of its efficiency relative to asymmetric encryption, such as PKI. That is why most current commercial SMS encryption solutions use password-based symmetric encryption. Passwords are used as a key distribution mechanism to synchronize ISSN: 2231-5381 first category of contributions to secure SMS communication — which is becoming feasible because of the increasing flow of ME with advanced computational capabilities — introduces security features through the implementation of security schemes at the application level. The resulting software frameworks can be categorized according to the place where the application implementing the security scheme, and their cryptographic keys, are stored. The first possibility is to locate the application and its keys in a programmable SIM card used by the ME. This solution is adopted by systems like the one developed by Rongyu et al. in [8] or by the IPCS Group with the IPCryptSIM [9]. A second contribution to secure SMS using Elliptic curve cryptography The Encryption and Decryption methods in ECC are designed to encode and decode a point on the curve and not the entire message. During http://www.ijettjournal.org Page 335 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 encryption, each character in the message has to be peer-to-peer fashion, without further interaction with converted into bytes then the bytes into points of the the SSMC server. Due to the use of a standard form (x, y) and then the points have to be encoded by interface definition, all the cryptosystem engines have mapping each of them with each point on the elliptic the same interface resulting in the ability to load them curve and then the entire encoded points have to be in the framework seamlessly [12]. converted back to bytes and then to strings as SMS III. Our proposal can carry only string values. Once the message reaches The new algorithm is called High performance RSA the receiver, during the process of decryption, the (HP-RSA). It can maintain the encrypted text of all string has to be converted to bytes; these bytes should possible characters at both sides of the sender and be decoded to points again using the mapping receiver side, for that they will communicate with each technique and then the points to bytes and finally to other before installing the application. So both are characters that form the message and only then the having the same encrypted values and also know SIM decrypted plain text can be viewed by the receiver [5]. card numbers (SIM serial number) with each other. It An alternative approach, adopted in systems like the can reduce the encryption time, decryption time, and one presented in [10], is to use a SIM card only to storage space in the system or mobile and also reduces store the cryptographic keys used in a scheme, while the network traffic. It is mainly monitors the repeated using the computational capabilities of the ME to run characters or symbols, if any character is repeated that the scheme. In addition, it is also possible to use a SIM character not send to encryption process, just place the card to perform certain cryptographic operations, index of that encryption text of hash table. It is more while executing the remaining part of the application useful in sending a file or a document in the encrypted through the ME, like in the mobile payment scheme format (because of mostly the number of characters presented by Hassinen et al. in [11]. are repeated), because it apply the encryption process Another alternative approach is The SEESMS only for unique characters, so it automatically reduce framework adopts hybrid architecture. If a user is the encryption time and decryption time and also interested in sending/receiving a secure message network traffic when we send the encrypted file through SEESMS and has never used it before, then he through the network. has to contact a trusted third-party server, called The new (TPKCSSM) system not reduce the Secure SMS Management Center (SSMC), to request encryption time and decryption time on a single a customized copy of the SEESMS client application. character comparing to RSA, so it is mainly suitable Similarly, if the user has already installed the for to send multiple lines of text in the encrypted SEESMS client, but does not own the public-key of format(SMS). It avoids the attacks at mobile side also the recipient of the message (or the public-key of the (Messages are stored as encrypted format). This user who sent him a secure SMS message), he has to algorithm also helps to store any file or any document contact the SSMC server to ask for a copy of his key in encrypted format at mobiles. Consider an example (this behavior is similar to the PGP key-servers). if we send the text like “Department of computer Instead, if the user already owns the public-key of his science svu university tirupati” in the encrypted format recipient, he will establish a direct communication in a using RSA with 1024 bit modulo. The length of the ISSN: 2231-5381 http://www.ijettjournal.org Page 336 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 plain text is 54, and each encrypted character size is asci[], then m is encrypted and applying hashing on it, 308(approximately), so the total encrypted text size is then searching the hash table, then m is substituted 308x54=16632. It is not possible to send that much with index. amount of text as SMS. If you apply the modified 4. Encrypt the message M with the public key (e, n) RSA (HP-RSA), it will encrypt the only 17 characters like encrypt[i] = ce mod (n). (unique), so the remaining 37 characters are repeated. 5. SIM serial number will be added to first ten That means it saves the encryption and decryption characters of cipher text (cipher text + SIM card time for 37 characters and also finally we send only number). 54 characters of text instead of 308x54=16632 6. The user Sends the message as cipher text is (indexes of hash table) is an unreadable format as encrypt[]. “aPDhCiePci,L`,ZLeD?iPC,@ZVPcZP,@>?,?cV>PC C. Decryption Process @Vi;,iVC?DhiV” is equivalent to the original The Receiver does the Following: message. 1. The algorithm at receiver side gets the SIM serial number of mobile number from the device and IV. HP-RSA Algorithm The HP-RSA (High Performance-RSA) algorithm separates the SIM serial number from cipher text and works in three phases, Initialization phase, encryption comparing it. If it is true then the following steps will and decryption phase is as follows. be done otherwise the message will not possible to A. Initialization phase decrypt. 1. Install the Secure SMS application at both ends. The 2. Uses the private key (d, n) to decrypt the message sender and receiver communicate and store the hash like table with same encrypted data of each character used 3. Decrypt the all characters in the encrypt[] array as in data exchange process. 3.1. index[i]=encrypt[i] 2. The Sender and receiver only know the public and 3.2. It checks each character before going to decrypt private keys. in the index table if it is not there, then 3. They are also shares the SIM card Numbers to each 3.3. temp=index[i] other using website server. 3.4. Ptxt[j]=harray[temp]d mod n 4. The website server maintains the all keys regarding 4. Else index[i] substituted by the Ptxt[j]. the group (Sender and receivers). V. Architecture of proposed model B. Encryption Process The Sender does the Following: The architecture of proposed model can be divided 1. Obtain the recipient public key (e, n) 2. Each character (c) of Message (M) will be represented as positive integer c < n. into two modules 1. Installation Process module 3. Before going to encrypt, search the asci value of character (m) is already encrypted or not? If m is found in the asci[] array then m is substituted by 2. Encryption process module 3. Decryption process module index of hash table. If m is not found in the array ISSN: 2231-5381 http://www.ijettjournal.org Page 337 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 Installation Process module allows the users to looking into the hash table and place the appropriate install the software, if they are interested sending and index of character. The asci[],encrypt[] arrays are receiving the messages through this Crypto system and maintains the asci values and indexes of the hash table has never used before they should register in the respectively. website and then download and install the software. Based on the user registration details the keys will be generated and stored in the server and also generates the hash table using those keys. If the receiver The function of the Encryption process system is encrypting the given character with given modulo (1024 bits minimum). It is same as Basic RSA. installing the software, he/she should sends the details The function of the Hashing process is generates the of sender to the server (website) then it provides the hash value for each unique encrypted character. We installable software with same hash table of sender. know hashing creates a collision problem that will be Otherwise the server provides the software with new overcome using linear probing method. The hash table hash table. will be prepared before installation process, in secure Architecture of Process of Encryption of Modified sms communication done only encryption and decryption. RSA Decryption Process Architecture Input TEXT ABC.. Monitoring System Unique Characters only Encryption Process System Encrypted TEXT Send cipher text Adding Recipient IME number to cipher text Place each character index Apply hashing on cipher text And place index of hash table Plain Text Separate the IME number And compare with SIM-SNO of that mobile number Decryptio n process system Read indexes of received text and substitute encrypted text Monitoring System Fig-1 Fig-2 The diagram in fig-1 represents the encryption The above diagram represents the Decryption process. Its having the following modules is process. Its having the following components is 1. Authentication process A. Monitoring System. 2. Hash table process B. Encryption process 3. Monitoring System. C. Hashing process. Where the function of monitoring system is every 4. Decryption process character is checked before send to encryption process, The function of Authentication process is to verify if it is unique character then allowed, otherwise the recipient mobile is valid or not. If it is valid it ISSN: 2231-5381 http://www.ijettjournal.org Page 338 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 allows further process otherwise, the message not VI. Results and Analysis possible to decrypt. When the message reach to recipient The Application will active and get the SIM serial number using “getSimSerialNumber()” method For purpose of verification of HP-RSA the Android environment is used for developing secure SMS crypto system for mobiles, in which hash table generation and verify it. module is used to store encrypted values , encryption The function of Hash table process is to read the each module performs encryption process and decryption character of cipher text and matching with the Hash modules for decrypting the SMS message. The Fig-3 table values. If the matching is done then it will be represents the Hash table format at both sides of the send to Monitoring system. The below diagram sender and receiver. Fig-4 represents the user message represents the Hash table, it maintains encrypted text composer; it allows the user to send the message in of the all possible characters of the keyboard. Those encrypted format. After Users input, the SMS message indexes are not actual asci values of characters, so it as normal text and click the Encrypt button, it will avoids the mobile side attacks. To store the important encrypted using HP-RSA algorithm. The monitoring messages always in encrypted format, when we need system plays an important role, which allows only to view the messages then decrypt it. unique characters to encryption process. Fig-3 represents the normal message as well as encrypted message; the encrypted message contains the SIM serial number also (not mobile number). When we click send button the message sending to receiver. Fig-6 represents the receiver side application, the message will be reached to receiver mobile, then automatically our application will be invoked and display the message as an encrypted format, then the Authentication process will be done as, it gets the SIM serial number of recipient and Fig-3 compare the SIM serial number of carrying message, The function of Monitoring system is to monitor the each character before to send the decryption process. if both are same the message will be decrypted otherwise the message is not possible to decrypt. Each unique character of receiving text will be stored into the index array. So it avoids the decryption for Fig-7 represents the successful decrypted message, repeated characters. It will be more helpful to reduce when the authentication process is valid then the consumption of decryption time. message will be decrypted. The function of Decryption process is to decrypt the each character of received text using hash table and monitoring system. (Modified RSA) ISSN: 2231-5381 http://www.ijettjournal.org Page 339 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 Fig-6 Fig-4 Fig-5 Fig-7 A. Analysis Different messages has been tested in Android environment based devices and the analysis for Basic-RSA and HP-RSA with 1024 bit-modulo in terms of encryption time and decryption time is as follows. ISSN: 2231-5381 http://www.ijettjournal.org Page 340 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 S. Encryption Process Time Decryption Considering N In milli seconds Process Time Characters O 1 2 3 4 5 In milli seconds Msg- RS HP- Length A RSA 30 16 58 RSA HP-RSA RSA HPRSA 15 906 516 30 15 48 16 1610 609 58 19 85 62 16 2344 672 85 20 106 78 22 2875 688 106 22 147 94 31 3984 782 147 25 Fig-9 Table-1 The above table represents the three sections Encryption process time and Decryption time and how many characters to be used complete the encryption and The above diagram represents the Decryption process time; the Basic-RSA takes the more amount of time than the HP-RSA. decryption process of message. Due to the monitoring VII. Conclusions system module the HP-RSA encrypt and decrypts the This paper presents Secure SMS crypto System framework unique characters only. for mobile devices, a software framework that allows two peers to exchange encrypted SMS messages. This frame work differs from the other frameworks presented so far in literature, because it allows users to choose the hash table based on public and private keys. It avoids the tampering the message and insecure data storage. It reduces the network traffic and the computations also reduced comparing to traditional public cryptographic algorithms because the encrypted data will be stored at both sides of sender and receiver but those indexes are not actual characters and we use the RSA with some extension and Fig-8 also uses the SIM card number for authentication (not The above diagram represents the Encryption process time the RSA takes the more amount of time comparing to HPRSA because it encrypts the all characters of message, but the HP-RSA encrypts the unique characters only. The HPRSA takes the some (negligible) amount of time for mobile number). Comparing to other related work it provides the more security at mobile side attacks and network side attacks. It is also provides the signing feature because of the encrypted message also carry the SIM card number of the receiver as well as sender (mobile number). searching the repeated characters. ISSN: 2231-5381 http://www.ijettjournal.org Page 341 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 7 - Mar 2014 References [1] Rafat, Ali, The SMS Privacy Problem, Textually.org 7695-3967-6/10 $26.00 © 2010 IEEE 10.1109/CISIS.2010.81 website, http://www.textually.org/textually/archives/2004/04/00348 9.htm, last accessed 19 October 2006 [2] Breed, Allen G., Ubiquitous message technology can be powerful tool for good or ill, TMCNet Website, http://www.tmcnet.com/usubmit/2006/10/17/1985881.htm, last accessed 19 October 2006. [3] Jones, Nick, Don't Use SMS for Confidential Communication, Gartner Website, 26 November 2002, http://www.gartner.com/DisplayDocument?doc_cd=11172 0, last accessed 19 October 2006. [4] GSM World, GSM Services, http://www.gsmworld.com/services/index.shtml,last accessed 17 October 2006. [5] Sri Rangarajan, N. Sai Ram, N. Vamshi Krishna “Securing SMS using Cryptography” [6] Mobile security - Wikipedia, the free encyclopedia , www.wikipedia.org [7] Yu Loon Ng Short message service (sms) Security solution for mobile devices PDF file [8] H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, “A PK-SIM card based end-to-end security framework for SMS,” Computer Standards & Interfaces, vol. 31, no. 4, pp. 629–641, 2009. [9] IPCS Group “IPCryptSim SMS Encryption”, http://www.ipcslive.com/ pdf/IPCSSMS.pdf, online visited July 2009 [10] M. Toorani and A. Beheshti Shirazi, “SSMS - A secure SMS messaging protocol for the m-payment systems,” in Computers and Communications, 2008. ISCC 2008. IEEE Symposium on, July 2008, pp. 700–705. [11] M. Hassinen, K. Hypp ¨ onen, and K. Haataja, “An Open, PKI-Based Mobile Payment System,” in ETRICS, 2006, pp. 86–100 [12] Alfredo De Santis, Aniello Castiglione “An Extensible Framework for Efficient Secure SMS” 978-0- ISSN: 2231-5381 http://www.ijettjournal.org Page 342 DOI