SMS Security by Elliptic Curve and Chaotic Encryption Algorithms
Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute...
Uložené v:
| Vydané v: | Al-Mustansiriyah journal of science Ročník 34; číslo 3; s. 56 - 63 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Mustansiriyah University
30.09.2023
|
| Predmet: | |
| ISSN: | 1814-635X, 2521-3520 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.
|
|---|---|
| AbstractList | Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method.
Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication technologies and communications technology. SMS messages without a password are stored in the SMS server. For the purpose of review and dispute resolution. The security of SMS content cannot be protected because it is transmitted in plain text and is accessible to network operators and employees. Therefore, the end-to-end key is based on encryption and decryption technology can provide SMS security. The security protocols used for SMS security on contemporary mobile devices were examined in this study. SMS security system encryption time affects how well mobile devices work. This shows that security technologies take longer to generate keys and encrypt keys as the key size increases. Due to the limited processing power of mobile devices, large-scale algorithms such as DES, AES, RC4, and Blowfish are not suitable for SMS encryption. SMS may be encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. And chaotic theory, encryption is simple, fast and secure data encryption. As a result, a combination of elliptic curve algorithm and chaotic encryption algorithm is proposed to achieve a high level of security. In this paper, several tests have been done to compare the algorithms in terms of throughput, power consumption, SMS size, encoding time, and decoding time. The results indicate that the proposed method is better than the comparison method. |
| Author | Mohammed, Hind Ibrahim Salman, Ziadoon W. Enad, Ayman Mohammed |
| Author_xml | – sequence: 1 givenname: Ziadoon W. orcidid: 0000-0002-1748-0907 surname: Salman fullname: Salman, Ziadoon W. – sequence: 2 givenname: Hind Ibrahim surname: Mohammed fullname: Mohammed, Hind Ibrahim – sequence: 3 givenname: Ayman Mohammed surname: Enad fullname: Enad, Ayman Mohammed |
| BookMark | eNo9kF1rwjAUhsNwMOe83m3_QDUnX03uJsVtgmMX3WB3IWkardRGUhX671d17OrAe97zcHge0agNbYXQM-AZoZLDfL_rZmfKajoDCvIOjQknkFJO8AiNQQJLBeU_D2jadTuMMaFAOYUxeik-iqSoylOsj31i-2TZNPXhWJdJfornKjGtS_KtCZdk2ZaxH3ahTRbNJgwX2333hO69abpq-jcn6Pt1-ZW_p-vPt1W-WKclsEymUjFuuAdswKiMAZSEMSats8pn3GTCC7DCK884ZUI6U1E8FMEJ66Q0lE7Q6sZ1wez0IdZ7E3sdTK2vQYgbbeLwZVNp5TwrORipwDIuvVJu4IMUiggL3g6s-Y1VxtB1sfL_PMD66lMPPvXVp774pL-bS2nv |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.23851/mjs.v34i3.1318 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 2521-3520 |
| EndPage | 63 |
| ExternalDocumentID | oai_doaj_org_article_9df4c51a891b458f99d76f186926b1fb 10_23851_mjs_v34i3_1318 |
| GroupedDBID | .K5 AAYXX ADBBV AFWDF ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ OK1 |
| ID | FETCH-LOGICAL-c1478-8945a5f10a1a97411c24448bdb9f75a76f61b6f9f453468dae30a971d6bd88a33 |
| IEDL.DBID | DOA |
| ISSN | 1814-635X |
| IngestDate | Tue Oct 14 18:49:38 EDT 2025 Sat Nov 29 03:08:02 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://creativecommons.org/licenses/by-nc/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1478-8945a5f10a1a97411c24448bdb9f75a76f61b6f9f453468dae30a971d6bd88a33 |
| ORCID | 0000-0002-1748-0907 |
| OpenAccessLink | https://doaj.org/article/9df4c51a891b458f99d76f186926b1fb |
| PageCount | 8 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_9df4c51a891b458f99d76f186926b1fb crossref_primary_10_23851_mjs_v34i3_1318 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-09-30 |
| PublicationDateYYYYMMDD | 2023-09-30 |
| PublicationDate_xml | – month: 09 year: 2023 text: 2023-09-30 day: 30 |
| PublicationDecade | 2020 |
| PublicationTitle | Al-Mustansiriyah journal of science |
| PublicationYear | 2023 |
| Publisher | Mustansiriyah University |
| Publisher_xml | – name: Mustansiriyah University |
| SSID | ssj0002313531 ssib056224269 ssib051452450 |
| Score | 2.2334447 |
| Snippet | Short message services (SMS) represent one of the components of the global communications network and are one of the important developments in communication... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 56 |
| SubjectTerms | Chaos theory Decryption Elliptic curve algorithm Encryption Security Throughput |
| Title | SMS Security by Elliptic Curve and Chaotic Encryption Algorithms |
| URI | https://doaj.org/article/9df4c51a891b458f99d76f186926b1fb |
| Volume | 34 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2521-3520 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002313531 issn: 1814-635X databaseCode: DOA dateStart: 20050101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2521-3520 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib056224269 issn: 1814-635X databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT8IwFG4M8eDFiD8i_koPHvAwWLd2tDeRQDwoMUENt6VdW4HIMAxI-O997abh5sVr0zXL1-5976Vv34fQrUwyYXRoAgXkFFDKWKC4poGhMjSx4Ur738fenzrDIR-PxcuO1ZfrCSvlgUvg2kJbmjEiuSCKMm6F0J3EOiOlKFHEKhd9w47YKabgJEEWwCJa3dfNvKiL83fw1RcnNACWHZc6P8BYjLTns6K1iek0bpHY2X_sUNSOkr-nnMEROqxyRdwt37GO9kx-jOrV11jgZiUZfXeC7kfPIzyqrOiw2mLXigHBIMO99XJjsMw17k3kwo3082y59YECdz8_FvDEZF6cordB_7X3GFTeCEFGKBR-XFAmmSWhJBJKAkIy4GkK0CphO0wCRAlRiRWWspgmXEsThzCR6ERpzmUcn6FavsjNOcJUu7tBpUIOS0vLFSQ9YWQiTTJg84g1UPMHjvSrlMBIoXTwyKWAXOqRSx1yDfTg4Pqd5rSr_QDsaFrtaPrXjl78xyKX6MAZw5edHVeotlquzTXazzarabG88YflG-OdvyI |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SMS+Security+by+Elliptic+Curve+and+Chaotic+Encryption+Algorithms&rft.jtitle=Al-Mustansiriyah+journal+of+science&rft.au=Ziadoon+W.+Salman&rft.au=Hind+Ibrahim+Mohammed&rft.au=Ayman+Mohammed+Enad&rft.date=2023-09-30&rft.pub=Mustansiriyah+University&rft.issn=1814-635X&rft.eissn=2521-3520&rft.volume=34&rft.issue=3&rft_id=info:doi/10.23851%2Fmjs.v34i3.1318&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_9df4c51a891b458f99d76f186926b1fb |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-635X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-635X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-635X&client=summon |