ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securing Mobile Data using Cryptography

Journal: International Journal of Advanced Networking and Applications (Vol.7, No. 06)

Publication Date:

Authors : ; ;

Page : 2925-2930

Keywords : ASCII values; Cipher Text; Decryption; Encryption; Plain text; Secret Key;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Portability increases the probability for a wireless device to be stolen or lost. These devices usually carry sensitive business or private information. Government Employees store classified documents on their mobile devices. Corporate users save confidential files, PINs, Passwords on their devices. So the content of such devices should be protected from unauthorized access. However, the protection provided should not be heavy for a mobile phone because it would minimize the computing power, storage space, battery lifetime. To prevent this from happening, we are providing an algorithm which would ensure data privacy for the end users. ASCII values of plain text will be used to generate a secret key and same key would be used for decryption. It can be said to be a symmetric encryption algorithm because same key is used to encrypt and decrypt the data. A Secret key will be randomly generated from the ASCII values of plain text which when encrypted with the plain text will provide a cipher text which will be sent back to the Application with the key. For Decryption, cipher text and key will be fetched from Application and decryption process will occur at server. By this method this application will not be heavy for a mobile phone and this would be an efficient method for data security.

Last modified: 2016-07-15 15:59:47