You are on page 1of 6

IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems

ICIIECS’15

The Survey of Various Techniques & Algorithms for


SMS Security
Shraddha N Karale1 Kalyani Pendke2 Prashant Dahiwale3
M-Tech Scholar Assistant Professor Associate Professor
shraddha.karale1306@gmail.com pendke@gmail.com prashant.dahiwale@gmail.com.

Rajiv Gandhi College of Engineering and Research1,2,3


Nagpur, India

Abstract—Now days, Message authentication is an important attacks during the message transmission. The main goal of
security tool. But, without some security mechanism, it is difficult security mechanism is to provide message privacy that
to send data in secure manner. Most popular shortest and guarantees provision of confidentiality, integrity and non
cheapest textual form of communication is short message service repetition of data [2]. The main feature of network security is
(SMS). Cryptography is the one of the main categories of
to provide efficient authentication for data by using
computer security that converts information from its normal
form into an unreadable form by using Encryption and cryptographic techniques. There are some important terms are
Decryption Techniques. To ensure the security of the texts which used to secure private information.
is sent, many encryption algorithm are available. This paper will 1) Encryption
focus on message security and to secure the text data while It requires encryption algorithm and key. To encrypt more
transmitting in the network. The data which is to be transmitted data, symmetric encryption is used. A symmetric key is used
from sender to receiver in the network must be encrypted using for both the encryption and decryption processes.
the encrypted algorithm. ). Symmetric key algorithm reduces the 2) Decryption
problem of computational overhead and to the calculation of
It requires decryption algorithm and key. It is the process
algorithm and improves the performance of encryption. The
proposed paper is to provide more efficient authentication of taking encoded or encrypted text or other data and
mechanisms for textual data. The proposed review paper converting it back into text that you or the computer are able
presents a review of security techniques for SMS and a to read and understand. This method could be used to
performance comparison between most common encryption description of un-encrypting the data manually or with un-
algorithms like DES, 3DES, RC4, Blowfish and AES (Rijndael) encrypting the data using the proper codes or keys.
3) Key
Keywords— DES,3DES,RC4,Blowfish, AES Key is the combination of numeric and alphanumeric text
symbols . Key plays an important role in security mechanism
I. INTRODUCTION like cryptography. Encryption algorithm depends on key.
Computer Networks Security (CNS) is becoming more 4) Plain Text
important because of increasing demand for internet based Communication between two sides by using original
technologies. The increase in user’s privacy concerns is message is called as Plain Text.
related to the increasing use of the internet. Various types of 4) Cipher Text
tools have been exists to make message communications The message which cannot be understood by any
simpler and faster. Mobile technology is mostly preferred by unauthenticated person. This cipher text is formed from plain
many mobile users. Short message service (SMS) will play an text.
important role in the future business areas, which are 5) Symmetric and Asymmetric Encryptions
popularly known as mobile banking, governmental use, and There are two main categories of cryptography depending
daily life communication. SMS has become a popular wireless on keys used to encryption and decryption of the data. There
service throughout the world. The majority of SMS are are two main categories. They are Asymmetric and Symmetric
sending and receiving important data known as private data. encryption techniques. But this paper describes only
SMS techniques suffer from some problems such as symmetric algorithm techniques.
vulnerabilities, eavesdroppers and unauthorized access [1]. In
some cases, this data may also include very private A) Asymmetric Encryption
information reserved for the personal viewing of the legal It is also called as public key cryptography. In this
recipient. Unprotected communication poses serious security encryption user uses two different keys for encryption that is
vulnerabilities. Efficient authentication used to protect the public and private key. Private Key is used for decryption and
mobile subscribers from the undesirable communication this key is known to user. The public and the private keys are

978-1-4799-6818-3/15/$31.00 © 2015 IEEE


IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
related to Each other. In other words, data encrypted by one 3) Authentication
public key can be encrypted only by its corresponding private In network security, authentication plays an important role.
key [2]. The main objective of an authentication system is to guarantee
that only the authenticate users have access to the network
services. Authentication should be fast enough to support user
mobility. The process of proving one's identity. This means
that the system is used before sending and receiving data
using, the identity of receiver and sender should be verified.
This paper presents a comparison between the most common
and used symmetric key algorithms in the data encryption field.
4) Symmetric Algorithm Crieterias
Symmetric algorithm is depending on some criteria’s such as
architecture, security, Flexibility, Scalability and limitations
[5].
Fig: Asymmetric Encryption a) Architecture: It defines the structure and operations that an
B) Symmetric Encryption algorithm can perform and its characteristics and how they are
implemented and also how encryption and decryption is
It is also called as single key cryptography. It uses only perform.
one key for encryption and decryption. Receiver and the
Sender have to agree upon a single secret key in encryption b) Security: Security of an encryption algorithm mainly
process. Given plaintext and the key, encryption produces no depends on the key size used to execute the encryption.
readable data, which is about the same length as that of Generally keys size is greater encryption is stronger. Key
plaintext. Decryption is the reverse of encryption, and uses the length is measured in bits.
same key as encryption [2]. c) Flexibility: Defines whether the algorithm is able to endure
minor modifications according to the requirements.
d) Scalability: It is one of the major element on which
encryption algorithms can be analyzed. Scalability of data
depends on certain parameters such as Memory Usage,
Encryption rate, Software hardware performance;
Computational efficiency.
E) Limitation: This defines how the algorithm works by make
use of the computer resources available to it.

II. RELATED WORK


Fig: Symmetric Encryption
In this section the various performance factor and
Cryptography is used to achieve some goals. techniques used for encrypting the data used by various papers
are listed. In the research paper [1] proposed the Hybrid
1) Confidentiality Compression encryption technique for securing SMS data.
Confidentiality of data is maintained by using The proposed technique compresses the SMS to reduce its
encryption. In encryption algorithms plain text is converting length, then encrypts it using encryption algorithm.
into cipher text and in decryption algorithm cipher text convert In the research paper [3] proposed that Symmetric-key
back to plain text for ensuring data remains secrete. algorithms also known as single- key, one-key and private-key
Symmetric algorithms use the same key for encryption and encryption are a class of algorithms for cryptography, that
decryptions known as Symmetric algorithms while in uses a Private(shared secret) key and a Public (non-secret) key
asymmetric algorithms use different keys for decryption. to execute encryption or decryption process.
These keys are known as private and public keys. In the research paper [4] proposed that the different
2) Data Integrity performance factors are discussed such as key value,
To ensure the data is protected from accidental computational speed they concluded that AES algorithm is
modifications. Integrity is maintained by using message better among Symmetric algorithm.
authentication codes or hashes. A fixed length numeric value In the research paper [5] proposed the survey of SMS
derived from a sequence of data is called hash value. This encryption as well as decryption techniques, algorithms,
values are used to verify the integrity of data sent through models use in communication network and security.
insecure channels. The comparison between hash value of In the research paper [6] proposed the fair comparison
received data to the hash value of the data as it was sent to between three most common symmetric key algorithms like
determine if the data was altered. DES, Blowfish and AES.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
In the research paper [7] various experimental factors are DES, which made the DES is an insecure block cipher.
analyzed. Based on the text files used and the experimental result Initially DES was considering as strong algorithm but it has
was concluded that DES algorithm consumes least encryption large amount of data size and short key length limits its use. It
time and AES algorithm use least memory usage, Encryption time has 16 rounds. Once a plain-text message is received to be
differs in case of AES algorithm and DES algorithm. encrypted, it is arranged into 64 bit size of blocks required for
In the research paper [8] concluded that all the techniques are input. If the number of bits used in the message is not divisible
Useful for real-time encryption. Each technique is unique in by 64, then the last block of message will be padded.
Its own method, which might be suitable for different
applications Everyday new encryption technique is evolving 2) 3DES
hence fast and secure conventional encryption techniques, will DES was superseded by triple DES (3DES) in
always work out with high rate of security. November 1998, concentrating on the noticeable
In the research paper [9] proposed the Information or SMS imperfections in DES without changing the original structure
security is important problem in network secure of DES algorithm. Triple DES was much more complicated
communication. Encryption and decryption algorithms uses by version of DES. This achieves high level of security by
many authors for performance evaluation and security. Some encrypting the data using DES three times using with three
algorithms gives better performance but require more time for different unrelated keys. The combined key size is thus 168
encryption. The users who uses the AES algorithms. They bits beyond the reach of brute-force.
modified and doing changes in AES algorithm for reducing
complexity in the encryption process. 3) BLOWFISH
Blowfish is 64-bit block cipher- used to replace DES
algorithm. Ranging from 32 bits to 448 bits, variable-length
III. TECHNIQUE FOR SMS SECURITY key is used. Variants of 14 round or less are available in
Blowfish. Blowfish is unpatented and license-free and is
A) Encryption Technique: Hybrid Compression available free for all uses. Blowfish is one of the fastest block
In this technique [1], we describe the technique used to secure ciphers developed to date. Blowfish suffers from weak keys
SMS without increasing its length. There are two main steps problem, still no attack is known to be success. Blowfish is a
of this technique compression and encryption processes. symmetric block cipher that can be effectively used for
SMS Compression is the process of encoding SMS encryption and safeguarding of data. Blowfish algorithm
information using fewer bits than an non-encoded takes a variable-length key, from 32 bits to 448 bits, making
representation. The purpose of this process in the proposed it ideal for securing data. Blowfish was designed in 1993 by
technique is reducing the consumption of very expensive Bruce Schneier as a fast, free alternative to existing
resources and reducing SMS length. SMS encryption it is the encryption algorithms. Blowfish is unpatented and license-
process of security by encoding messages to make them non- free, and is available free for all uses. Though it suffers from
readable . The steps can be described as Follows: weak keys problem, no attack is known to be successful
against it (Bruce, 1996) (Nadeem, 2005).
Step 1: Get secrete message.
Step 2: Determine the message recipient. 4) RC4
Step 3: Compress the secrete message. RC4 is a stream cipher designed in 1987 by Ron Rivest for
Step 4: Check the compressed message length. RSA Security. It is a variable key size stream cipher. This
Step 5: Encrypt the compressed message using encryption algorithm is based on random permutation. In September
algorithm. 1994, the RC4 algorithm was anonymously posted on the
Step 6: Add signature to the message. Internet. This algorithm is easy and easy to explain. A variable
Step 7: Send the secrete message. length key is from 1 to 256. It is called pseudo- random
because RC4 generates a sequence of numbers that only
IV. ALGORITHM OVERVIEW approximates the properties of random numbers. The sequence
of bytes generated is not random since the output is always the
1) DES ( Data Encryption Standard): same for a given input. In stream cipher, data is encrypted and
It is designed by IBM in 1974. It is based on Lucifer decrypted bit by bit. It is also faster and more suitable for
cipher and which was the first encryption standard published streaming application. It acquires less CPU time, less resource
by NIST. DES is based on cipher called as Feistel Block utilization and also easy to implement but RC4 has much
Cipher. This algorithm consists of a number of rounds where weakness due to its small key size [11]. If the key size is short
each round contains bit-shuffling, non-linear substitutions (S- attackers can easily obtain the key and attack on data using
boxes) and exclusive OR operations. DES uses 56 bit key, key recovery algorithm.
and it maps 64 bit input block into a 64 bit output block. The
key used is actually looks like a 64 bit block, but one bit in 5) AES (Advanced Encryption Standards)
each of the 8 octets is used for odd parity on each octet. There It is symmetric block cipher. It was published by
are many attacks and methods for exploit the weaknesses of NIST.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
It has key of variable length size 128,192, and 256 bits. It has Rows are also interpreted as 128 bits whereas the Permutation
block size of 128 bits in 10, 12 and 14 rounds depending on function also takes 128 bits. In the permutation table each
key size. It can be implemented on various platforms like entry indicates a specific position of a numbered input bit may
small devices. It is carefully tested for much security also consist of 256 bits in the output. While reading the table
application. from left to right and then from top to bottom, we observe that
Following steps are used to encrypt a 128-bit block: the 242th bit of the 256-bit block is in first position, the 226th
1] Obtain the set of round keys from the cipher key. is in second position and so forth [9]. After applying
2] Initialize the state array with the original message permutation on 128 bits we again complete set of 128 bits and
(Plaintext). then perform next remaining functions of algorithm. If we take
3] Attach the initial round key to the starting state array. the inverse permutation it gives again the original bits, the
4] Implement nine rounds of state manipulation. output result is a 128-bit cipher text. For the full decryption of
5] Perform the tenth and last round of state manipulation. Modified-AES algorithm the transformation processes are,
6] Copy the final state array out as the non readable data Inv-Bytesub, Inv-Shiftrows, Inv-Permutation, and the
(Cipher text). Addroundkey, which are performed in 10 rounds as it is in the
Encryption process consists of a series of steps to alter the state of encryption process. Based on analysis it is shown that which
array. There are four steps involve in encryption. algorithm is better to use based on following performance
They are as follows. metrics.
a. Sub Bytes: This operation is a simple substitution that
In this converts every bite into a different value. In this 128-bit 1)Encryption time-
block is replaced with another 128-bit block for substitution It is the time that an encryption algorithm takes to
process. produce a cipher text from a plaintext.
b. Shift Rows: Each row is rotated to the right by certain number 2) Decryption time-
of bytes
It is the time that a decryption algorithm takes to
c. Mix Columns: Array is processed separately to each column of
produce a plaintext from a cipher text.
the state to produce a new column. The new column replaces the
old one
3) Throughput-
d. XorRoundKey: This operation simply catch b the existing The throughput is defining the speed of encryption.
state array, The throughput is calculated as the total plaintext in Kilobytes
In Decryption process is obtained by driving back all the steps encrypted/ encryption time (KB/sec). As the power
taken in encryption using inverse functions like InvSubBytes, consumption decreases throughput increases.
InvShiftRows, and InvMixColumns. AES has great flexibility 4) CPU process time:
with effective resistance against cryptanalytic attack. The It is the time that a CPU is dedicated only to the
security of AES is depending on variable key size allowing up particular process for calculations. It reflects the load of the
to 256 bit providing resistance against attacks. In all block CPU. As the CPU time used in the encryption process is more
ciphers AES encryption is fast and flexible as compared to load is high.
other encryption.. In case of hardware implementation of AES 5) Memory Utilization:
is very fast as compared to other encryption. Memory utilization defines how memory is
consumed at the time of encryption and decryption.
6) Modified AES The above performance metrics are defined by using
To reduce the problem of high computation and following task.
computational overhead we use the AES and modify it. The i) Compute the time of encryption and decryption for each
AES is also known as modified AES because of by totaling algorithm using different sizes input file.
the initial permutation step takes from DES in order to enlarge ii) Calculate the throughput for each algorithm in KB/Sec
encryption performance. Modified AES has four steps, these iii)The nature of changing the key size on
four steps are as follows: encryption/decryption time.
1) Substitution Byte
2) ShiftRow iv) The outcome of changing file size on memory utilization.
3) Permutation v) Calculate the CPU time for encryption and decryption for
4) AddRoundKey each algorithm using different sizes input file.
Here we use Permutation instead of MixColumn Substitution Performance analysis shows the behavior and performance of
Byte, ShiftRow, and AddRoundKey remain same as in AES. this particular algorithm and Quality of Services achieved by
Permutation is widely used in cryptographic algorithms. that algorithms or protocols. As like same here we have done
Permutation operations are interesting and important from performance review for different algorithms used in survey
both cryptographic and architectural points of view. The DES section of this paper. The bellow given discussion of
algorithm will provide us permutation tables. The inputs to the Performance Review contains.
IP table consist of 128 bits. Modified-AES algorithm takes
128 bits as input. The functions Substitution Bytes and Shift
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
V. DISCUSSION
After analysis of papers and algorithms using papers included
in survey observed following discussion. The comparison is In future work we have doing survey of the more encryption
done in terms of power consumption, processing time and and decryption algorithms. And develop stronger, secure, and
throughput. As the throughput increases power consumption easy new algorithm for encryption and decryption for Android
Factors BLOWFIS
mobile communication.
DES RC4 AES
Analyzed H
(40 TO 128,192, VI.CONCLUSION
KeyLength 64 128
128) 256 This paper discusses the various security mechanisms to
(32,64,1
Block size 64
28)
64 128 provide message authentication. paper presents the survey of
Encryption various security algorithms like DES, 3DES, BLOWFISH,
low low high high RC4 and AES in detail. It finally discuss about the Modified
Ratio
Security
Inadequate
Less
Less secure
Highly AES algorithm. DES and Triple DES not provide extra
Attacks secure secured security and making use of double and triple encryption and
Most Modifica Replacem very slow when implemented on software [5]. DES has large
Common, tion of ent for amount of data size and short key length limits its uses.
Not Strong DES, Excellent DES,
Features
Enoug Adequat Security Excelle Blowfish and RC4 suffers from weak keys problems. After
h e nt analyzing all the above algorithms the most popular
Security Security symmetric algorithm is AES (Rijndael) which is most
Power Flexible, and have best Encryption performance. Secure, faster
Consumptio high high Low low and better. In future we can perform same experiments on
n
image data, audio data & video data and developing a stronger
Hardware
and
Better in encryption technique with high speed and for great
hardware Not very Not very Faster and throughput.
Software
than efficient efficient efficient
Implementa
software
tion
VII. REFERENCES
TABLE: COMPARISON OF VARIOUS ENCRYPTION ALGORITHMS
[1] "Mitigating Attacks on Open Functionality in SMS-Capable Cellular
decreases. In [9], compares different algorithms of stream Networks", P. Traynor, W. Enck, P. McDaniel and T. La Porta,
IEEE/ACM Transactions on In Networking, 17(1):40-2009
cipher (Salsa 20, HC-128, VMPC, RC4, HC- 256,Grain) and
[2]. “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms
block cipher( DES,3DES, , Blowfish, AES) on the basis of Simulation Based Performance Analysis”, Jawahar Thakur, Nagesh
CPU time and throughput the better algorithm can be used for Kumar, IJETAE- Dec-2011
network security in mobile devices. This paper concludes that [3] “International Journal of Science and Research (IJSR), India Online S.
stream ciphers are faster than block cipher. In this paper we Jacobs and C.P. Bean ISSN: 2319-7064 Volume 2 Issue 4, April 2013
[4] “A Survey on Performance Analysis of DES, AES and RSA Algorithm
have do the survey of previous and new encryption as well as along with LSB Substitution Technique”, B. Padmavathi , S. Ranjitha
decryption. Finally here prove that the AES algorithm is Kumari,IJSR-April 2014
secure, fast and strong encryption algorithm for mobile [5] “Symmetric Algorithm Survey: A Comparative Analysis”, Shujaat
communication. AES algorithm solves the major issue of Khan, Mansoor Ebrahim- IJCA- Jan-2013
[6] “Data Security In Local Area Network Based On Fast Encryption
security in mobile communication and SMS encryption in
Algorithm”, G. Ramesh and R. Umarani- ICTACT-June 2010
network [8]. From following diagram shows a comparison
between various encryption algorithms on the basis of [7] “Comparative Analysis of AES and RC4 Algorithms for Better
Utilization”, Nidhi Singha, J.P.S.Raina- IJCT-2011
scalability like memory usage and their performance in [8] “MSC : Mobile Secure Communication sing SMS in Network Security
encryption. From the figure we analyzed that AES is best : A Survey”, Punam V. Maitri, Rekha V. Sarawade
among all these related encryption algorithms [12]. Blowfish [9] “Modified Advanced Encryption Standard”, Pravin Kawle, Avinash
and AES has same performance of encryption but different in Hiwase, IJSCE- March 2014
memory usage. [10] “Enhancing Data Security by using Hybrid Cryptographic Algorithm”,
Jigar Chauhan, Neekhil Dedhia
[11] “Comparative Analysis of AES and RC4 Algorithms for Better
Utilization” - Nidhi Singhal , J.P.S.Raina- IJCTTE- August 2011
[12] “Comparative Analysis on Different parameters of Encryption
Algorithms for Information”, Md Asif Mushtaque, JCSE-April-2014

.
Fig: Comparison of various encryption algorithms based on scalability
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15

You might also like