Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality
Shahebaz Ahmed Khan1 , P. Padmanabham2 , K V Naganjaneyulu3
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-10 , Page no. 79-83, Oct-2015
Online published on Oct 31, 2015
Copyright © Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu, “Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.79-83, 2015.
MLA Citation
MLA Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu "Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality." International Journal of Computer Sciences and Engineering 3.10 (2015): 79-83.
APA Citation
APA Style Citation: Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu, (2015). Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality. International Journal of Computer Sciences and Engineering, 3(10), 79-83.
BibTex Citation
BibTex Style Citation:
@article{Khan_2015,
author = {Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu},
title = {Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {79-83},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=709},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=709
TI - Providing RC5 Security for Messages in Android Based Mobile Devices for Achieving Confidentiality
T2 - International Journal of Computer Sciences and Engineering
AU - Shahebaz Ahmed Khan, P. Padmanabham , K V Naganjaneyulu
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 79-83
IS - 10
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2527 | 2455 downloads | 2468 downloads |




Abstract
The idea of this paper is to study the symmetric key algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. so that the better algorithm can be picked to import its functionality in the Android based mobile devices. Here, we analyse their performance mainly this beats, end memory requirements and speed are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. The above algorithms will be first implemented in C, C++ or JAVA and their performance will be analysed. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving a single digit. The message will be decrypted only after the full key version is matched with the given symmetry of the key .This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.
Key-Words / Index Term
Non-repudiation, symmetric algorithms, RC5,DES, AES, 3DES, full key, cryptography
References
[1.] Atul Kahate “Cryptography and Network Security”, Tata McGraw-Hill Companies, 2008.
[2.] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004
[3] Ronald L. Rivest, “RC5 Encryption Algorithm”, Dr Dobbs Journal, Vol. 226, PP. 146-148, Jan 1995
[4] Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997).
[5]Khawlah A. AI-Rayes, Aise Zulal Sevkli, Hebah F. AI-Moaiqel, Haifa M. AI-Ajlan, Khawlah M. AI-Salem, Norah I. AI-Fantoukh "A Mobile Tourist Guide for Trip Planning" IEEE MULTIDISCIPLINARY ENGINEERING EDUCATION MAGAZINE, VOL. 6, NO. 4, DECEMBER 2011
[6]MIDP_Mobile_Media_API_Developers_Guide_v2_en
[7] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.
[8.] R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Volume 21 No. 2, Feb. 1978.
[9] Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass.02139 (Revised March 20, 1997). Available at: httu://theory.lcs.mit.cdu/-rivest/Rivest-rc5rev.pd
[10]“Detecting passive content leaks and pollution in android applications,” in Proceedings of the Network and Distributed System Security Symposium , 2013.