Professional Documents
Culture Documents
ICIIECS’15
Abstract—Now days, Message authentication is an important attacks during the message transmission. The main goal of
security tool. But, without some security mechanism, it is difficult security mechanism is to provide message privacy that
to send data in secure manner. Most popular shortest and guarantees provision of confidentiality, integrity and non
cheapest textual form of communication is short message service repetition of data [2]. The main feature of network security is
(SMS). Cryptography is the one of the main categories of
to provide efficient authentication for data by using
computer security that converts information from its normal
form into an unreadable form by using Encryption and cryptographic techniques. There are some important terms are
Decryption Techniques. To ensure the security of the texts which used to secure private information.
is sent, many encryption algorithm are available. This paper will 1) Encryption
focus on message security and to secure the text data while It requires encryption algorithm and key. To encrypt more
transmitting in the network. The data which is to be transmitted data, symmetric encryption is used. A symmetric key is used
from sender to receiver in the network must be encrypted using for both the encryption and decryption processes.
the encrypted algorithm. ). Symmetric key algorithm reduces the 2) Decryption
problem of computational overhead and to the calculation of
It requires decryption algorithm and key. It is the process
algorithm and improves the performance of encryption. The
proposed paper is to provide more efficient authentication of taking encoded or encrypted text or other data and
mechanisms for textual data. The proposed review paper converting it back into text that you or the computer are able
presents a review of security techniques for SMS and a to read and understand. This method could be used to
performance comparison between most common encryption description of un-encrypting the data manually or with un-
algorithms like DES, 3DES, RC4, Blowfish and AES (Rijndael) encrypting the data using the proper codes or keys.
3) Key
Keywords— DES,3DES,RC4,Blowfish, AES Key is the combination of numeric and alphanumeric text
symbols . Key plays an important role in security mechanism
I. INTRODUCTION like cryptography. Encryption algorithm depends on key.
Computer Networks Security (CNS) is becoming more 4) Plain Text
important because of increasing demand for internet based Communication between two sides by using original
technologies. The increase in user’s privacy concerns is message is called as Plain Text.
related to the increasing use of the internet. Various types of 4) Cipher Text
tools have been exists to make message communications The message which cannot be understood by any
simpler and faster. Mobile technology is mostly preferred by unauthenticated person. This cipher text is formed from plain
many mobile users. Short message service (SMS) will play an text.
important role in the future business areas, which are 5) Symmetric and Asymmetric Encryptions
popularly known as mobile banking, governmental use, and There are two main categories of cryptography depending
daily life communication. SMS has become a popular wireless on keys used to encryption and decryption of the data. There
service throughout the world. The majority of SMS are are two main categories. They are Asymmetric and Symmetric
sending and receiving important data known as private data. encryption techniques. But this paper describes only
SMS techniques suffer from some problems such as symmetric algorithm techniques.
vulnerabilities, eavesdroppers and unauthorized access [1]. In
some cases, this data may also include very private A) Asymmetric Encryption
information reserved for the personal viewing of the legal It is also called as public key cryptography. In this
recipient. Unprotected communication poses serious security encryption user uses two different keys for encryption that is
vulnerabilities. Efficient authentication used to protect the public and private key. Private Key is used for decryption and
mobile subscribers from the undesirable communication this key is known to user. The public and the private keys are
.
Fig: Comparison of various encryption algorithms based on scalability
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15