SMS Security by Elliptic Curve and Chaotic Encryption Algorithms

Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Al-Mustansiriyah journal of science Jg. 34; H. 3; S. 56 - 63
Hauptverfasser: Salman, Ziadoon W., Mohammed, Hind Ibrahim, Enad, Ayman Mohammed
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Mustansiriyah University 30.09.2023
Schlagworte:
ISSN:1814-635X, 2521-3520
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.  
AbstractList Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.  
Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.  
Author Mohammed, Hind Ibrahim
Salman, Ziadoon W.
Enad, Ayman Mohammed
Author_xml – sequence: 1
  givenname: Ziadoon W.
  orcidid: 0000-0002-1748-0907
  surname: Salman
  fullname: Salman, Ziadoon W.
– sequence: 2
  givenname: Hind Ibrahim
  surname: Mohammed
  fullname: Mohammed, Hind Ibrahim
– sequence: 3
  givenname: Ayman Mohammed
  surname: Enad
  fullname: Enad, Ayman Mohammed
BookMark eNo9kF1rwjAUhsNwMOe83m3_QDUnX03uJsVtgmMX3WB3IWkardRGUhX671d17OrAe97zcHge0agNbYXQM-AZoZLDfL_rZmfKajoDCvIOjQknkFJO8AiNQQJLBeU_D2jadTuMMaFAOYUxeik-iqSoylOsj31i-2TZNPXhWJdJfornKjGtS_KtCZdk2ZaxH3ahTRbNJgwX2333hO69abpq-jcn6Pt1-ZW_p-vPt1W-WKclsEymUjFuuAdswKiMAZSEMSats8pn3GTCC7DCK884ZUI6U1E8FMEJ66Q0lE7Q6sZ1wez0IdZ7E3sdTK2vQYgbbeLwZVNp5TwrORipwDIuvVJu4IMUiggL3g6s-Y1VxtB1sfL_PMD66lMPPvXVp774pL-bS2nv
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.23851/mjs.v34i3.1318
DatabaseName CrossRef
Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ: Directory of Open Access Journal (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2521-3520
EndPage 63
ExternalDocumentID oai_doaj_org_article_9df4c51a891b458f99d76f186926b1fb
10_23851_mjs_v34i3_1318
GroupedDBID .K5
AAYXX
ADBBV
AFWDF
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
OK1
ID FETCH-LOGICAL-c1478-8945a5f10a1a97411c24448bdb9f75a76f61b6f9f453468dae30a971d6bd88a33
IEDL.DBID DOA
ISSN 1814-635X
IngestDate Tue Oct 14 18:49:38 EDT 2025
Sat Nov 29 03:08:02 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://creativecommons.org/licenses/by-nc/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1478-8945a5f10a1a97411c24448bdb9f75a76f61b6f9f453468dae30a971d6bd88a33
ORCID 0000-0002-1748-0907
OpenAccessLink https://doaj.org/article/9df4c51a891b458f99d76f186926b1fb
PageCount 8
ParticipantIDs doaj_primary_oai_doaj_org_article_9df4c51a891b458f99d76f186926b1fb
crossref_primary_10_23851_mjs_v34i3_1318
PublicationCentury 2000
PublicationDate 2023-09-30
PublicationDateYYYYMMDD 2023-09-30
PublicationDate_xml – month: 09
  year: 2023
  text: 2023-09-30
  day: 30
PublicationDecade 2020
PublicationTitle Al-Mustansiriyah journal of science
PublicationYear 2023
Publisher Mustansiriyah University
Publisher_xml – name: Mustansiriyah University
SSID ssj0002313531
ssib056224269
ssib051452450
Score 2.2334447
Snippet Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 56
SubjectTerms Chaos theory
Decryption
Elliptic curve algorithm
Encryption
Security
Throughput
Title SMS Security by Elliptic Curve and Chaotic Encryption Algorithms
URI https://doaj.org/article/9df4c51a891b458f99d76f186926b1fb
Volume 34
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ: Directory of Open Access Journal (DOAJ)
  customDbUrl:
  eissn: 2521-3520
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002313531
  issn: 1814-635X
  databaseCode: DOA
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 2521-3520
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib056224269
  issn: 1814-635X
  databaseCode: M~E
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcCCKA9RXvLAUIa0cWM79kapWrFQIRWkbpEfMW1FU9SX1H_P2QmoGwur5UTRd_bdfcrp-xC618qlnMYmIsbYiPqhHGHSJOKQ-nKrvEQdDWYT6XAoxmP5umf15WfCSnngEri2tI4aRpSQRFMmnJQ25c4bKXW4Jk777Bunco9MwUmCLoB1aPW_bhZEXby_Q2BfgtAIquy41PmBisVIez5btbYJnSYtknj7j70StafkH0rO4AQdV70i7pbfWEcHeXGK6tVtXOFmJRn9cIYeRy8jPKqs6LDeYT-KAcnA4N5muc2xKizuTdTCr_QLs9yFRIG7nx8LeGIyX52j90H_rfccVd4IkSEUiJ-QlCnmSKyIAkpAiIE6TYW2WrqUKYCIE82ddJQllAur8iSGjcRybYVQSXKBasWiyC8Rjg0VNofOTXUsdcQIwDZnShttZMyVaqDmDxzZVymBkQF1CMhlgFwWkMs8cg305OH63ea1q8MCRDSrIpr9FdGr_3jJNTryxvDlZMcNqq2Xm_wWHZrterpa3oXD8g2MW7-e
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SMS+Security+by+Elliptic+Curve+and+Chaotic+Encryption+Algorithms&rft.jtitle=Al-Mustansiriyah+journal+of+science&rft.au=Salman%2C+Ziadoon+W.&rft.au=Mohammed%2C+Hind+Ibrahim&rft.au=Enad%2C+Ayman+Mohammed&rft.date=2023-09-30&rft.issn=1814-635X&rft.eissn=2521-3520&rft.volume=34&rft.issue=3&rft.spage=56&rft.epage=63&rft_id=info:doi/10.23851%2Fmjs.v34i3.1318&rft.externalDBID=n%2Fa&rft.externalDocID=10_23851_mjs_v34i3_1318
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-635X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-635X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-635X&client=summon