0% found this document useful (0 votes)
26 views42 pages

FYP final report

The project report titled 'Smartphone Text Encryption Using Multiple Algorithms' aims to develop a secure messaging application for smartphones that utilizes a Hybrid Cipher Algorithm to protect SMS communications from security vulnerabilities. The application is designed for both Android and iOS platforms, focusing on providing end-to-end encryption, ensuring confidentiality, integrity, and authentication of messages. The report outlines the project's objectives, methodology, and the importance of cryptography in securing mobile communications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views42 pages

FYP final report

The project report titled 'Smartphone Text Encryption Using Multiple Algorithms' aims to develop a secure messaging application for smartphones that utilizes a Hybrid Cipher Algorithm to protect SMS communications from security vulnerabilities. The application is designed for both Android and iOS platforms, focusing on providing end-to-end encryption, ensuring confidentiality, integrity, and authentication of messages. The report outlines the project's objectives, methodology, and the importance of cryptography in securing mobile communications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

SMARTPHONE TEXT ENCRYPTION USING MULTIPLE

ALGORITHMS

USAMA AHMED SIDDIQUE


SHEHARYAR AHMED
UMAIR KHAN

A project report submitted in partial fulfilment of the


Requirements for the award of the degree of
Bachelor of Information Technology (BSIT)

Computer Science Department


Bahria University, Karachi Campus

2022
DECLARATION

Except for citations and quotations that have been properly acknowledged, we
declare that this project report is based on our original work. We further declare that
it has not been submitted for any other degree or award at Bahria University or other
institutions earlier or concurrently.

Name : USAMA AHMED SIDDIQUE

Reg No. : 54235

Signature : _________________________

Name : SHEHARYAR AHMED

Reg No. : 54243

Signature : _________________________

Name : UMAIR KHAN

Reg No. : 54256

Signature : _________________________

Date : _________________________
APPROVAL FOR SUBMISSION

We certify that USAMA AHMED SIDDIQUE / UMAIR KHAN / SHEHARYAR


AHMED's project report "SMARTPHONE TEXT ENCRYPTION USING
MULTIPLE ALGORITHMS" has reached the minimum standard for submission
in partial fulfilment of the criteria for Bahria University's Bachelor of Information
Technology (BS-IT) degree.

Approved by,

Signature : _________________________

Supervisor : Mr. Jawad Bhutta

Date : _________________________
According to Bahria University's Intellectual Property Policy BUORIC-P15, which
was revised in April 2019, the copyright to this report belongs to Bahria University.
The usage of any material contained in or derived from this paper must always be
acknowledged.

© 2019 Bahria University. All right reserved.


ACKNOWLEDGEMENTS

We would want to express our gratitude to everyone who helped us complete this
project successfully. We would like to thank Mr. Jawad Bhutta, our research
supervisor, for his important advice, direction, and immense patience throughout the
project's growth.

We'd also like to show our thanks to our supportive parents and friends for their
support and encouragement.
SMARTPHONE TEXT ENCRYPTION USING MULTIPLE ALGORITHMS

ABSTRACT

The introduction of Short Messaging Services (SMS) has fundamentally altered the
way people communicate and share information. Every day, billions of text messages
are transferred around the world in plain text format, putting users' privacy and
security at risk. SMS continues to be vulnerable to security vulnerabilities and
loopholes, thanks to a growing lot of software crackers out there on the internet. For
a long time, information security was assumed to be limited to personal computers
and networks. Malicious attackers are now targeting mobile devices and their users
as the technical trend shifts away from desktops and toward mobile devices. This
project's goal is to create a safe messaging system that enables smartphones to reduce
these vulnerabilities and loopholes while sending and receiving messages. Our goal
is to build an app for end-to-end message encryption that can hide messages while
being transmitted from source device to destination using the Hybrid Cipher
Algorithm. This application is designed for both Android and IOS based devices.
The hybrid technique incorporates a combination of various cryptographic
algorithms that works together to provide secure message communication. Our
program is a peer-to-peer security mechanism that ensures secrecy, security services
for verification, integrity, and non-repudiation.
TABLE OF CONTENTS

DECLARATION ii
APPROVAL FOR SUBMISSION iii
ACKNOWLEDGEMENTS v
ABSTRACT vi
TABLE OF CONTENTS vii
LIST OF TABLES ix
LIST OF FIGURES x
LIST OF SYMBOLS / ABBREVIATIONS xi
LIST OF APPENDICES xii

CHAPTER

1 INTRODUCTION 1
1.1 Background 1
1.2 Problem Statements 1
1.3 Aims and Objectives 2
1.4 Scope of Project 2

2 LITERATURE REVIEW 4
2.1 Cryptographic Algorithm Performance with Symmetric
Keys 4
2.2 Security Analysis of Cryptographic Algorithms 5
2.3 Security Services for Mobile Instant Messaging 6
2.3.1 Confidentiality 6
2.3.2 Integrity 6
2.3.3 Non Repudiation 6
2.3.4 Authentication 6
2.4 Mobile Chat Applications and Cryptography 7

3 DESIGN AND METHODOLOGY 9


3.1 System Design Phases 9
3.2 Hybrid Cryptography Algorithm 9

4 IMPLMENTATION 11
4.1 Encryption Process 11
4.2 Decryption Process 13
4.3 Hashing Process 15

5 RESULTS AND DISCUSSIONS 16


5.1 Algorithm Analysis 16
5.2 Comparison with Other Algorithms 16
5.2.1 Graphical Data Representations 17
5.3 Resulting Architecture 19

6 TESTING AND EVALUATION 20


6.1 Application Testing & Performance Evaluation 20
6.1.1 Testing Devices 20
6.1.2 Testing Results 20
6.1.3 Performance Evaluation 21
6.1.4 Application Front End Evaluation 22

7 CONCLUSION AND FUTURE WORK 24


7.1 Future Scope 24
7.2 Conclusion 25

REFERENCES 26

APPENDICES 28
LIST OF TABLES

TABLE TITLE PAGE

2.1 Comparison of Famous Chat App Security Features

5.1 Algorithm Data Analysis

5.2 Comparison Analysis

6.1 Testing Devices & Their Specifications

6.2 Testing Analysis 1

6.3 Testing Analysis 2


LIST OF FIGURES

FIGURE TITLE PAGE

2.1 Cryptography Concept

2.2 Round Key Method

3.1 Hybrid Approach Diagram

4.1 Encryption Process Diagram

4.2 Decryption Process Diagram

4.3 Hashing Process Diagram

5.1 Analysis of 192 Bit Message Size

5.2 Analysis of 384 Bit Message Size

5.3 Analysis of 576 Bit Message Size

5.4 The Resulting Architecture

6.1 Application Performance Results

7.1 Security Research Analysis


LIST OF SYMBOLS / ABBREVIATIONS

 XOR Operator
* Multiplication Operator
+ Append Operator

SMS Short Message Service


AES Advance Encryption Standard
KDC Key Distribution Channel
RSA Rivest Shamir Adleman
PIN Personal Identification Number
DES Data Encryption Standard
XOR Exclusive-OR Boolean Logic Operation
ASCII American Standard Code For Information Interchange
LIST-OF-APPENDICES

APPENDIX TITLE PAGE

A Graphs
CHAPTER 1
INTRODUCTION

1.1 Background
Messages, thoughts, and information are now transferred using various message
sending programs, technology advancements and the digitization era. In a wireless
cellular communication system, data security is critical. Data is sent between a
sender and a receiver in this communication, and both end users are worried about
the security of their shared data. In the world of wireless communications based on
SMS or information transferred between two users, security is a key issue. Many
hackers may be available at such moment to hack crucial SMS data and secret
information. Unauthorized individuals (attackers) illegally breach the network and
get access to data. As a result, this is a major issue that necessitates network security
[1].

Information security refers to the protection of transferred data against unauthorized


access, disclosure, use, destruction, modification, or inspection. Privacy in our
personal communications is something that everyone wishes for. Cryptography can
be used to ensure data confidentiality [3]. Security is provided in cryptography by
encoding data before sending it and decoding it after receiving it. To secure data
privacy, a variety of cryptographic techniques are employed. Short message service,
or SMS, is now generally accepted as a means of information sharing, and many
organizations and customers are concerned about security. As a result, end-to-end
SMS encryption is required to ensure that SMS transmissions are secure.

1.2 Problem Statements


Because the present messaging technology allows plain text messages to be
exchanged, the SMS can be simply intercepted and replayed using existing software
crackers. In this day and age, when privacy is so important, it's critical that we
develop a secure messaging program that ensures a private messaging system for
brief messaging services. Although encrypted texting isn't always necessary, it can be
a useful safety when you, your family, or business partners need to communicate for
sensitive data from one side of the world to the other. Individuals' lives and priorities
have become increasingly dependent on smartphones phones in recent years [6]. The
most common applications are in chatting and discussion apps. The following are
some of the issues that have been found in these applications:
i) No protection and privacy of the data exchange between users.
ii) Easily hacked or steal of message data.
iii) Lack of Authentication Assurance.
iv) The difficulty of creating and deploying an end-to-end encryption program
for SMS mobile technologies.
v) Constant breach of data transmitted over the internet, which is inherently
unsecured, posing a significant risk to end users and mobile phone users.
vi) A scarcity of locally created and deployed applications for safe mobile SMS
transmission based on existing encryption techniques.

1.3 Aims and Objectives


The objectives of this project are shown as following:
i) Create a hybrid cryptography method for end-to-end encrypted Short
Message Service (SMS) that is superior to traditional encryption and highly
effective against vulnerable assaults like brute force.
ii) To implement security measures whenever data is transported from one
mobile device to another, as it is critical to protect data while it is in transit
[12].
iii) To provide a secure environment for sensitive data during message
transmission.
iv) To create a user-friendly system that is both simple to use and secure at the
same time.
v) Provide sufficient SMS security using encryption, decryption, and hashing
techniques, as well as a suitable algorithm, to avoid fraud in situations where
private and confidential data must be communicated.

1.4 Scope of Project


SMS is a rapidly increasing service in mobile communication technology these days.
When compared to other services, SMS is determined to be advantageous. However,
sending data in a secure manner is difficult without security system. The goal of our
project is to create a secure way for sending data. For user efficiency and in
consideration of current market trends, we are implementing our strategy using
Android technology. Most attacks, according to our theory, may be prevented. It can
be utilized by persons at the organizational level, as well as military personnel who
must exchange a lot of sensitive information with one another. Security of user data
is currently one of the most major issues. Any unauthorized user can steal user data
in different ways at any time. It has become easier to protect user data from
interceptor. Scope of our project is to solve this problem and to provide a secure way
for transmitting data. Our proposed hybrid cryptographic algorithm is safe and ideal
to secure user data and share it without any data loss or theft by an authorized user.
Our project mainly focuses on the following key points:
i) Fast and easy way of sending secure stuff (messages).
ii) Highly secure platform.
iii) App will be more stable and user friendly.
iv) An easy process to encrypt/decrypt messages.
CHAPTER 2
LITERATURE REVIEW

2.1 Cryptographic Algorithm Performance with Symmetric Keys


We'll go over the basics of cryptography, including what it is and why we need it.
The study of secrets is generally referred to as cryptography. Decryption is the
process of converting encrypted text into readable text, whereas encryption is the
process of converting readable text into unreadable text [7].
The basic steps in the classic encryption model are as follows:
i) The sending of a simple text message.
ii) Using a key and algorithm to convert the original message into cipher text.
iii) Sending the cipher text through a medium.
iv) Converting the cipher text back to the original message at the receiver end
using the same algorithm and key.

Plain Text Encryption

Decryption Cipher Text

Figure 2.1: Cryptography Concept


2.2 Security Analysis of Cryptographic Algorithms
We talked about AES, DES, and RSA, among other encryption algorithms. There are
two types of key encoding: symmetrical and asymmetric. To encrypt and decode
information, symmetrical key encoding requires only one key. Asymmetric key
encryption necessitates the use of two keys: public and private. It's used to overcome
the key distribution problem. As a-symmetric requires more computing power than
symmetric, it is slower. Encryption is done with a public key, and decryption is done
with a private key. DES employs 64-bit keys, but AES uses a variety of keys,
including 128, 192, and 256-bit keys. They discussed the DES algorithm, which is a
typical approach for safeguarding secret information. DES was replaced by AES, a
faster algorithm. Sub bytes, add round key, shift rows, and mix column are some of
the steps. A public key algorithm is the RSA algorithm. It included stages for key
generation, encryption, and decryption. Encryption, Rounds, Algorithm, Block size,
Key size Security, decryption, scalability, and stimulation speed the key has been
used. Trojan stallion, the 18 factors analysed include ciphering, and deciphering
method, inherent vulnerability, hardware, and software implementation [9].

Figure 2.2: Round Key Method


2.3 Security Services for Mobile Instant Messaging
Relevant dangers to any chat application should be identified and explained to
evaluate it from a security standpoint [13].

2.3.1 Confidentiality
The term confidentiality refers to the need that messages delivered across a
communication link between two parties to be viewed only by the intended
recipients. Encryption is the mechanism that ensures confidentiality between two
parties to achieve this purpose. A cryptographic approach encrypts a communication,
which can only be decrypted by the intended recipient. Confidentiality is a security
feature that ensures that the user can verify the signature using the public key they
acquired during the key exchange process. Users are allowed to verify the sender's
identity within their mobile phones, eliminating the need to consult third-party
servers to verify the sender's validity.

2.3.2 Integrity
Integrity is a security service that ensures data isn't tampered with during
transmission from source to destination. Typically, message integrity is ensured by
hashing the ciphertext, encrypt the message hashing and delivering it to the
destination with the message. After receiving the message, the recipient will decrypt
the ciphertext hashing and compare it to his own hashing. If the message hashing of
the receiver matches the sender's message hashing, the integrity is achieved else, the
message has been modified.

2.3.3 Non Repudiation


Non-repudiation is a security feature that prevents the source and destination from
disputing their roles in the transmission of a message. As a result, when
communication is transmitted, the receiver can show that the message was sent by
the supposed sender. Similarly, when a communication is received, the sender can
verify that the message was received by the supposed receiver.

2.3.4 Authentication
One of the most important parts of security is authentication, which demands an
entity's identification or during contact. This prevents any malicious attack, when a
malicious user manipulates a user's identity and presents himself to the server as the
authorized user, this is known as impersonation. The two types of authentication
techniques are weak authentication and strong authentication.

23.4.1 Weak Authentication


When a company or organization only uses one type of identifying credentials, such
as a Password or PIN-based authentication, it is referred to as weak authentication. It
is seen as a flaw in the system since It's vulnerable to a variety of attacks, such as
brute force attacks. Brute force is one in which a malicious user attempts many
passwords until they find one that matches the user’s selected password.

23.4.2 Strong Authentication


Strong authentication is defined as the use of encryption that is often challenge-
response in nature. The client must authenticate his identity and verify himself using
different methods in this technique. One-time passwords (OTP) and certificate-based
authentication are two methods for performing such authentication (CBA). The
system generates one-time passwords using a shared secret key that is stored on a
device that belongs to the entity. CBA uses asymmetric cryptography to deliver
public-private key cryptography. Each user has a unique signature, which can be use
validate the person’s identification using this approach.

2.4 Mobile Chat Applications and Cryptography


Forensic Analysis of WhatsApp on Android Smart Phones was researched by author
Thakur, Neha S., due to security concerns. Android forensics has progressed over
time, presenting both exciting prospects and challenging obstacles. On the one hand,
Android's open source nature allows developers to contribute to the platform's rapid
growth, while Android users may be unaware of the security and privacy
ramifications of putting these apps on their phones. Users may believe that a
password-protected device safeguards their personal information, however programs
might store private information on devices in unexpected ways. Although there are
several other well-known chat apps available for Android and iOS, none of them can
guarantee complete security [10].
Table 2.1: Comparison of Famous Chat App Security Features

SECURITY FEATURES OF FAMOUS CHAT APPS

Encrypted Public keys


Encryption so, that Public-key Attack
Platforms distribution (Man in
by default provider verification detection the middle attack
cannot read protection)

Yes
WhatsApp Yes Yes No Public key exchange
(manual) through server

Facebook No No No No No
messenger

Yes
Viber Yes Yes No Public key exchange
(manual) through server

Yes
Signal Yes Yes No Public key exchange
(manual) through server

Google
No No No No No
Hangouts

Skype No No No No No

Snapchat Yes No No No Public key exchange


through server
CHAPTER 3
DESIGN AND METHODOLOGY

3.1 System Design Phases


This portion describes how the study's requirements will be achieved and how
challenges found will be addressed. In our case, we use 4 phases to explain the
procedure. These phases are cryptography algorithms (Cryptography is the practice
of studying and hiding data/information), application design, integration, and testing
[2].
The first includes researching several encryption algorithms and then implementing
the ones that best suit our needs. To secure the message in our project, we use
encryption and hashing as cryptographic algorithms. Then, in the second part
(Application Design), we use React Native to construct an app for message
encryption. The asks the user to type their message as well as the key (to perform
encryption and decryption). The third phase will be integration, where we add the
cryptographic algorithms to our android application for SMS encryption. Our last
phase will be testing, where we test the android application. We test the environment
with some fixed data and compare our algorithm with other cryptographic
algorithms. Based on our methodology, we presented a system in which the user
enters plain text, which is converted into a ciphertext that can be communicated via
application, and the end-user can decrypt the text by adopting the type of the very
same algorithm very same algorithms type and entering the same sender private key
[15]. You can double-check that your secret communication is conveyed securely
without outside influence from hackers or crackers by utilizing this method.

3.2 Hybrid Cryptography Algorithm


The hybrid cryptographic algorithm protects a system against attacks and malicious
penetration. Hybrid cryptography is a type of encryption that combines two or more
cryptographic algorithms. It combines several multiple cryptographic algorithms to
maximize the benefits of each type of encryption. These advantages are speed and
security, respectively [13]. Hybrid cryptography here ensures five security purposes:
i) Confidentiality: Assuring that only the receiver can read the message.
ii) Authentication: The act of establishing one's identification.
iii) Integrity: Assuring the recipient that the message he or she has received has
not been tampered with in any manner.
iv) Non-repudiation: A way for proving that the communication was
transmitted by the sender.
v) Key exchange: The technique through which crypto keys are shared between
sender and receiver.

Figure 3.3: Hybrid Approach Diagram


CHAPTER 4
IMPLMENTATION

4.1 Encryption Process


The technique of converting plain text data into something that appears random and
meaningless is known as encryption (ciphertext). In our project, the encryption
process includes the following steps:
i) Create a key text of 24 bytes from any size input or text message.
ii) Create a four-by-four matrix of blocks. This is symbolized by the letter M.
Therefore, i and j are both zero.
iii) Convert the characters in the message to ASCII equivalents.
iv) Conduct Permutation 1 using the procedures below.
a. Interchange column C2 by C3 and column C3by C2.
b. Interchange row R2 by R3 and row R3 by R2.
c. XOR between column C1 and column C2 i.e. C1  C2 = A.
d. XOR between column C3 and column C4 i.e. C3  C4= B.
e. Substitute column C1 by A and column C4 by B.

v) Use the methods below to calculate the key.


a. Create a 4*4 block matrix from key text, each of which has a set length of
16 bytes (or 128 bits).
b. Generate an ASCII equivalent of the key.

vi) Combine Permutation 1 with the key matrix using an XOR operation.
vii) Perform a mix column operation, i.e., XOR the result of step 6 with the result
of step 6.

[ ]
2 3 1 1
1 2 3 1
viii) Constant Matrix =
1 1 2 3
3 1 1 2
ix) Reverse the entire matrix block.
x) Convert the block value into corresponding hexadecimal value.
xi) Using substitution box (s-box).
xii) Convert the matrix values to encoding characters by arranging them as plain
text.

Plain Text Plain Text

4*4 Matrix 4*4 Matrix

Convert into ASCII Convert into ASCII

Permutation 1

XOR

Mix Column

Reverse Whole Block

Convert into Hexadecimal

S-Boxes

Arrange in Plaintext

Convert Encoding Character

Encrypted Text

Figure 4.4: Encryption Process Diagram


4.2 Decryption Process
Decryption is the process of restoring encrypted data to its original format. It is
simply the reverse of encryption, where the message recipients decrypt the
information back into its original, readable format. In our project, the decryption
process includes the following steps:
i) After the encryption procedure receives the encrypted text.
ii) Convert the cipher text to Hexadecimal.
iii) Convert Hexadecimal Value into ASCII equivalent.
iv) Generate a 4*4 block matrix. Which is symbolized by the letter M. Initially, i
and j are both zero.
v) Reverse the whole matrix using inverse substitution box (S-box).
vi) Convert whole matrix into decimal value.
vii) Reverse whole block of matrix.

[ ]
2 3 1 1
1 2 3 1
viii) Constant Matrix =
1 1 2 3
3 1 1 2
ix) Perform a mix column operation, i.e., XOR the result of step 7 with a
constant matrix.
x) Compute the Key using the steps below:
a. Create a 4 * 4 block matrix from the key text, with each block having a
set length of 16 bytes (or 128 bits).
b. In ASCII, convert the key to the relevant characters.

xi) Execute XOR operation on the result of step 10 and key matrix then perform
permutation 2 using following steps:
a. Interchange C1 XOR C2 = M and C3 XOR C4 = N.
b. Replace C1 by M and C4 by N.
c. Replace R2 with R3 and R3 with R2.
d. Replace column C2 with column C3 and C3 with column C2.

xii) Convert the message into ASCII equivalent then finally arrange the ASCII
equivalent into plaintext.
Cipher Text

Decoded Character

Arrange into 4*4 Matrix

Reverse S-Box Key Text

Convert into Decimal 4*4 Matrix

Reverse Whole Block Convert into ASCII

Mix Column

XOR Operation

Permutation 2

ASCII

Plain Text

Figure 4.5: Decryption Process Diagram


4.3 Hashing Process
Process of changing a key into a generated value is hashing. Using a mathematical
technique, a hash function is used to generate the new value [7]. A hash value, or
simply a hash, is the result of a hash function. Following under is the hash function
architecture of our project:

Figure 4.6: Hashing Process Diagram


CHAPTER 5
RESULTS AND DISCUSSIONS

5.1 Algorithm Analysis


The hybrid algorithm technique that we’ve used is a combination of both hashing and
symmetric cryptography. Here hash function helps to achieve integrity security
service while encryption / decryption technique helps in achieving confidentiality
and authentication, as well as increasing the security of messages exchanged over the
network. The results of the experiments were obtained by installing the system on a
variety of mobile device models. The messages were then transmitted, and the
outcomes were calculated. Our algorithm analysis shows the following results:

Table 5.2: Algorithm Data Analysis

5.2 Comparison with Other Algorithms


The hybrid algorithm is one of the efficient approaches to achieve SMS security
while transmission from sender to receiver side. Although there are many other
effective solutions for this such as AES (Advanced Encryption Standard) or DES etc.
To test the efficiency of our hybrid model, we’ve checked our application on both
Android and IOS devices to gather the successful results and compare it with some
other famous algorithms for the performance satisfaction. The gathered results are
shown below:

Table 5.3: Comparison Analysis

Data Key Size Run Time


Model Message Size (Bits) Encryption Decryption
192 - Bit 0.092s 0.075s
Hybrid 384 - Bit 128 0.141s 0.107s
576 - Bit 0.271s 0.174s
192 - Bit 0.530s 0.005s
AES 384 - Bit 128 0.660s 0.006s
576 - Bit 0.730s 0.006s
192 - Bit 0.380s 0.006s
DES 384 - Bit 64 0.410s 0.006s
576 - Bit 0.450s 0.007s

5.2.1 Graphical Data Representations


Since we all know that visual representation of data is critical to analysing and
finding patterns and trends in the ever-increasing flow of data. It allows for the
simultaneous study of massive amounts of data. Therefore, we’ve gathered data
based on algorithm performance to perform a comparative analysis of hybrid model
against other famous techniques. The collected information is based on three
different message sizes.

52.1.1 Message Size (192 - Bit)


Following results are obtained when message size is 192 bits.
Figure 5.7: Analysis of 192 Bit Message Size

52.1.2 Message Size (384 - Bit)


Following results are gathered when the message size is 384 bits.

Figure 5.8: Analysis of 384 Bit Message Size

52.1.3 Message Size (576 – Bit)


Following results are obtained, when the message size is 576 bits.
Figure 5.9: Analysis of 576 Bit Message Size

5.3 Resulting Architecture


Since the main purpose of our proposed algorithm is to secure any message or
information without any loss of data. Keeping that in mind, our hybrid technique
stores the cipher text (encrypted message) on the server. The key and hashing values
are stored in a database on the connected server as well. When a user requests data,
he/she receives an encrypted message from the connected server, then queries the
database for the key and hash code. Once the hashing code and key are obtained, the
user decrypt the data using the suggested algorithm and obtains the original text.
After performing various analyses we’ve found that, this resulting model is very
strong in terms of security and the speed. Following below is the resulting
architecture of our application:
Figure 5.10: The Resulting Architecture

CHAPTER 6
TESTING AND EVALUATION

6.1 Application Testing & Performance Evaluation


Identifying is a crucial step in the critical analysis process whether the developed
application fulfils the requirements. Furthermore, testing helps in improving the
features and usability of applications in addition to delivering bug-free applications.
To test the developed application, there are various types, methods, and strategies.
We’ve tested our application on both IOS and Android platform to evaluate the final
performance of our designed model (i.e. Hybrid Cryptography).

6.1.1 Testing Devices


The application is tested on both Android as well as IOS based devices to analyse the
performance and end user experience. Following are the specifications of both the
devices:

Table 6.4: Testing Devices & Their Specifications

Specs Android Device IOS Device

Model Realme 7 Pro Apple iPhone 9

OS Android 10 IOS 13

Chipset Qualcomm Snapdragon 720G Apple A13 Bionic

RAM 6 GB 3 GB

Internal Storage 128 GB 256 GB

6.1.2 Testing Results


After various analyses of both the platforms, we found that our application very
strong in terms of security performance, compatibility and the processing speed. The
results on both the devices are similar to each other, hence the target to provide a
secure message transmission has been achieved and it’s working accurately on both
the platforms.
61.2.1 Encryption Test Cases
Following below is the encryption testing result of our application on both devices:

Table 6.5: Testing Analysis 1

61.2.2
D

ecryption Test Cases

Following below is the decryption testing result of our application on both devices:

Table 6.6: Testing Analysis 2

6.1.3 Performance Evaluation


The application was installed on various other devices as well to analyse its
compatibility level and the user experience. We’ve successfully tested all the features
and evaluate the performance of our application on both Android as well as IOS
based platforms. As stated below, after successfully installing our encrypted
messaging program, the following results were obtained:
Performance Chart
User Friendly Device Compatibility Secure Messaging

95

95

95

95
90

90
85

80

80
An d r o i d R esu l t s I OS R esu l t s Em u l at o r R esu l t s

Figure 6.11: Application Performance Results

The above shown results concluded that our application provide satisfactory
performance on every tested platform. The designed app focuses on providing highly
secure message transmission as well as efficient execution on every usable platform.
This application successfully provide the following security services:
i) Confidentiality
ii) Integrity
iii) Authentication
iv) Non - Repudiation

6.1.4 Application Front End Evaluation


Inspired by some of the popular chat application like WhatsApp or Facebook
Messenger, our secure messaging app also provides a user friendly interface and chat
features which allows the user to securely send and receive confidential text
messages. Any new user first have to register him/her self to use this app. After the
registration process the user can use his/her credentials to access this application
anytime whenever wanted to send or receive confidential messages. Our
application’s front end was evaluated in terms of compatibility with various
smartphones, the ability to encrypt and decrypt text messages, the time interval for
sending and receiving messages and finally, the robustness of the secure messaging
application.
Figure 6.12: Front End Chat Process
CHAPTER 7
CONCLUSION AND FUTURE WORK

7.1 Future Scope


Data theft is a type of cybercrime that can have serious consequences. Message
communication is the most regular and important method of exchanging information.
This material could include sensitive or vital information that has to be protected.
Encryption may be able to assist with this. We used cryptography algorithms and
techniques to do this. Security is one of the most interesting topics for the researches,
because with the passage of time and advancement in different technologies, the
security is becoming the toughest challenge to achieve [14].

Primary Research Areas In Terms Of IT Security

Unauthorize Disclosure / Data Breach Other Incidents


Denial of Services Ransomware

Figure 7.13: Security Research Analysis

The above analysis clearly shows that data breach is one of the most important area
when it comes to IT security. Keeping that in mind, we’ve created a secure message
transmission application using hybrid cryptographic technique to minimize this threat
and provide highly secure sending and receiving of messages from one device to
another. Although still there can be many more features added to this such as key
distribution [2]. The distribution of keys is one of the most critical factors that must
be addressed. The key can be distributed using one of the methods listed below:
i) The key can be delivered to the sender and receiver by an authorized third
party.
ii) Using encryption techniques, the sender and receiver's old key can be turned
to a new key.
iii) Using KDC, a key can be distributed to both users.
iv) For safe key exchange, the Diffie-Hellman method can be utilized.

Other than key distribution mechanism, there can be some other important features as
well, such as:
i) Achieving audio, video, image, and file encryption using the same technique.
ii) Improving the security of the exchange of key and hash codes.
iii) Can work on multithreading as if each block can process at a time.

7.2 Conclusion
Secure message transmission is required to protect our messages from many types of
attacks. It is vital to prevent having our message interrupted by anyone other than the
sender and receiver. So, using hybrid cryptographic algorithm In our mobile security
system, we offer a messaging security solution. It provides secrecy, authentication,
integrity, and nonrepudiation security services. Our chat app is compatible for both
IOS and Android devices. High-level organizations and military personnel can use
our project to share classified information. We will provide users with a reliable
communication service. Users can quickly and simply will be using this application
for high-security communication.
REFERENCES

[1] F. N. Zainab Khyioon, " SMS Encryption for Android Mobile Using the
Encryption Algorithm (Review)," 2019.

[2] A. H. Ahsan Ullah, "Design and Implementation of Android Based Text


Encryption," Journal of Internet & Networking, vol. 1, no. 3, 2019.

[3] G. P. C. S. V. P. Poonam Mandavkar, "SMS Security for Android Mobile Using


Cryptographic Algorithms," Vol. 3, no. 4 of the International Journal of
Advanced Research in Computer and Communication Engineering, 2014.

[4] D. S. Saivya Gulati, " ON ANDROID, SMS ENCRYPTION WITH AES


APPLICATION," Himachal Pradesh, 2018.

[5] U. D. P. g. Shobha Jha, " "SMS Encryption on Android Using NTRU


Algorithms," International Journal of Scientific Engineering and Applied
Science (IJSEAS, vol. 2, no. 1), 2016.

[6] U. S. K. Jitha P V, " International Journal of Computer Science and Mobile


Computing", vol. 8, no. 5, "SMS SECURITY SYSTEM USING
ENCRYPTION TECHNIQUES, 2019.

[7] D. A. H. A. K. a. M. M. H. Mina, "Performance Analysis of Symmetric


Cryptographic Algorithm," 2008.

[8] E. a. E. V. Ekwonwune, " Journal of Software Engineering and Applications,


vol. 13, no. 3, 2020, "Design and Implementation of End to End Encrypted
Short Message Service (SMS) Using Hybrid Cipher Algorithm.

[9] P. a. A. S. "A study of encryption algorithms AES, DES, and RSA for security,"
Global Journal of Computer Science and Technology, 2013. Mahajan, "A study
of encryption algorithms AES, DES, and RSA for security," Global Journal of
Computer Science and Technology, 2013.
[10] U. K. T. A. a. H. C. K. Rathi, " "6th International Symposium on Digital
Forensic and Security: Forensic Analysis of Encrypted Instant Messaging
Applications on Android" (ISDFS), 2018.

[11] F. F. D. a. E. R. Idrizi, " "Speed analysis of combined cryptographic algorithms


with secret and public keys," International Journal of Engineering Research and
Development 8.2, 2013.

[12] N. R. Potlapally, " IEEE Transactions on Mobile Computing 5.2, "A study of
the energy consumption characteristics of cryptographic algorithms and security
protocols", 2006.

[13] K. V. Bhat S., " Advances in Intelligent Systems and Computing, "Secure and
Efficient Data Privacy, Authentication, and Integrity Schemes Using Hybrid
Cryptography", 2019.

[14] H. C. Biswas, " International Conference on Electrical, Computer, and


Communication Engineering, "An Efficient Algorithm for Confidentiality,
Integrity, and Authentication Using Hybrid Cryptography and Steganography"
(ECCE), 2019.

[15] M. Hossain, " Journal of Information Security, vol. 10, no. 1,Design and
Development of a Novel Symmetric Algorithm for Enhancing Data Security in
Cloud Computing." 2019.

APPENDICES
APPENDIX A: Graphs

Since we know that there are various cryptographic algorithms and techniques and
has each of them their own weakness points and strength points. The results of the
several cryptographic algorithms are collected to judge their performance in terms of
various security and compatibility factors. Also, we will analysis the comparisons
between the other cryptographic techniques in terms of performances, weaknesses
and strengths. The analysis is based on graphical representations, which will show
the encryption and decryption performance of cryptographic algorithms.

1. Encryption Time Comparison for Large Datasets:

2. Encryption Time Comparison for Small Datasets:

3. Average Percentage Time Efficiency Comparison:


4. Decryption Time Comparison for Large Datasets:

5. Decryption Time Comparison for Small Datasets:

6. Average Percentage Time Efficiency:


7. Encryption Throughput Efficiency Analysis:

8. Decryption Throughput Efficiency Analysis:

You might also like