首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:Optimum Security Technique for Smart Phones
  • 本地全文:下载
  • 作者:Renu Rani ; Dr.Renu Bagoria
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2015
  • 卷号:4
  • 期号:5
  • 页码:3484
  • DOI:10.15680/IJIRSET.2015.0405096
  • 出版社:S&S Publications
  • 摘要:Securing mobile and smartphone data is vital issue in the communication industry and schemes thatcould be used to secure mobiles are not easy to implement and efficient so far. Securing data includes the messaging andadditional application services on mobile devices. The applications available in market are not very reliable and surfingfrom issues of memory and resources. Additionally the security measures provided by smart phones are not enough tomaintain the privacy of the data stored on the phone or protect it from falling in the wrong hands in case of mobiletheft. Currently the security on smartphones is generally based on passwords and only effort made to secure the passwords isremoving the dependency of characters and numbers. Due to the lack of security in small devices the need of propersecurity of data is required. The method that is able to secure data in efficient way and very hard to cheat other than thepasswords, can be found by applying cryptography encryption algorithms. These encryption algorithms are very easysolutions to secure the data and as well not easy to break the security. There are two types of encryptions i.e. symmetric andasymmetric, in which the asymmetric cryptography encryption is better as it do not play with the security of data by usingonly one sided key because one sided keys are generally used in less secure areas. There are products available in marketbased on encryption but even those products are based on symmetric cryptography encryptions and we found thatasymmetric cryptography algorithms are more secure to deploy on smartphones additionally we found that amongthem only one algorithm is powerful enough to deploy on these devices. These findings are based upon thecomparison of algorithms in terms of memory and resources because most asymmetric encryption algorithms needlarge memory and heavy processor to use resources. We finally found that Elliptic curve cryptography algorithm is bestamong them to deploy on mobile devices as they have limited memory and resources.
  • 关键词:encryption; decryption; cryptography; symmetric key; secrete key
国家哲学社会科学文献中心版权所有