Information security in data exchange between mobile devices with Android system using RSA encryption

  • Fernando Solís Instituto Superior Rumiñahui - ISTER Universidad de las Fuerzas Armadas – ESPE
  • Diego Pinto Universidad de las Fuerzas Armadas – ESPE
  • Santiago Solís Instituto Superior Rumiñahui - ISTER
Keywords: IT security, cryptography, RSA, mobile devices, android system

Abstract

The new styles and ways of life lead to greater use of wireless networks, the mobile device being a tool for data transmission, which are susceptible to threats in the transmission channels in the network. IT security plays a very important role in guaranteeing the availability, privacy and integrity of information, one of the techniques that helps in this task is cryptography, whose foundation is to transform a message so that it is unintelligible except for those who have the Key to decipher it. The research focuses on the use of the RSA algorithm between mobile devices, the encrypted data is sent through communication channels called threads that through formulas and processes executed on the server, will help to execute the encryption and decryption of the data. To carry it out, a prototype for the exchange of data between mobile devices wirelessly was designed and implemented, conducting performance tests with three nodes to improve the security. The results show the efficiency of the algorithm and additionally its functionality, the times of encryption and decryption are fast against the sending of information without any method or algorithm used.

Downloads

Download data is not yet available.

References

Ambler, S. (2002). Agile Modeling: Effective Practices for eXtreme Programming and the Unified Process. John Wiley & Sons.
Barajas, S. (2004). Protocolos de seguridad en redes inalámbricas. Universidad Carlos III de Madrid.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-Oriented Software Architecture, Volume 1: A System of Patterns. Wiley.
Cadenhead, R. (2014). JAVA 8 (Programación). ANAYA MULTIMEDIA.
Carrera, E. (2010). The Cost of Security in Mobile Devices. 3rd International Congress in Telecommunications, Information Technology and Communications. Quito.
Cipriano, M. (2008). Factorización de N: recuperación de factores primos a partir de las claves pública y privada. XIV Congreso Argentino de Ciencias de la Computación - CACIC. Chilecito, La Rioja.
Downes, S., Belliveau, L., Samet, S., Rahman, M., & Savoie, R. (2010). Managing digital rights using JSON. Consumer Communications and Networking Conference (CCNC), IEEE.
Inc., G. (2016). Android. Recuperado el 2016, de https://www.android.com/intl/es_es/
Karygiannis, T., & Owens, L. (2002). Wireless network security 802.11, Bluetooth and handheld devices - NIST.
Kruchten, P. (2004). The Rational Unified Process: An Introduction. Addison–Wesley.
Li, J., & Wang, X. (2010). Research and Practice of Agile Unified Process. IEEE Xplore Digital Library.
Meza, J. (Noviembre de 2010). Cifrado y descifrado asimétrico con RSA utilizando C#/Mono. Recuperado el Abril de 2016, de http://blog.jorgeivanmeza.com/2010/11/cifrado-y-descifrado-asimetrico-con-rsa-utilizando-cmono/
Miranda Arto, P. (Diciembre de 2010). Consumo energético de algoritmos criptográficos y protocolos de seguridad en dispositivos móviles Symbian.
Montero Miguel, R. (2014). JAVA 8 (Guía Práctica). ANAYA MULTIMEDIA.
Pino, C., & Hernández, C. (2000). Criptología y Seguridad de la Información: Actas de la VI Reunión Española Sobre Criptología y Seguridad de la Información: VI RECSI. Ra-Ma.
Scolnik, H. (2014). Qué es la Seguridad Informática. Buenos Aires: Paidós SAICF.
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google Android: A Comprehensive Security Assessment. IEEE Xplore Digital Library.
Sierra, J., & Lerch, D. (2014). Esteganografía y estegoanálisis. 0xWORD Computing S.L.
Young, A., & Young, M. (2006). An Elliptic Curve Asymmetric Backdoor inOpenSSL RSA Key Generation.
Published
2017-02-24
How to Cite
Solís, F., Pinto, D., & Solís, S. (2017). Information security in data exchange between mobile devices with Android system using RSA encryption. Enfoque UTE, 8(1), pp. 160-171. https://doi.org/https://doi.org/10.29019/enfoqueute.v8n1.123
Section
General Engineering