Real Time Cryptanalysis of A5/1 on a PC
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
State of Security for SMS on Mobile Devices
CERMA '08 Proceedings of the 2008 Electronics, Robotics and Automotive Mechanics Conference
SMS Encryption for Mobile Communication
SECTECH '08 Proceedings of the 2008 International Conference on Security Technology
Solutions to the GSM Security Weaknesses
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Security in Mobile Governmental Transactions
ICCEE '09 Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering - Volume 02
An Extensible Framework for Efficient Secure SMS
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
SMS Security: An Asymmetric Encryption Approach
ICWMC '10 Proceedings of the 2010 6th International Conference on Wireless and Mobile Communications
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Conditional estimators: an effective attack on A5/1
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The Short Message Service (SMS) is one of very popular kind of superior and well-tried services with a global availability in GSM networks. This paper deals with an SMS security for mobile communication. The transmission of an SMS in GSM network is not secure; therefore it is desirable to secure SMS by additional encryption. A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages. In the next part, there is the description of design and implementation of the application, which encrypts SMS by DES, Triple DES, AES and Blowfish algorithms and finally signs SMS by DSA or RSA algorithm respectively. At the end, we described attacks on secured SMS and future extension of the application.