Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

Teddy Mantoro, Andri Zakariya

Abstract


One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

Full Text:

PDF

References


Li B, Im EG. Smartphone, Promising Battlefield for Hackers. Journal of Security Engineering. 2011; 8(1): 89-110.

Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. Florida: CRC Press Inc. 1996.

Adinagara YT, Winarno I, Fathoni K. Enkripsi E-mail Dengan Menggunakan Metode ElGamal pada Perangkat Mobile. Institut Teknologi Sepuluh Nopember. Report number: 1228. 2011.

Fernando RG. Pembangunan Add-On Pada Mozilla Thunderbird Untuk Enkripsi Surat Elektronik Dengan Corrected Block Tiny Encryption Algorithm. Bachelor Thesis. Bandung: Institut Teknologi Bandung; 2009.

Yusoff MA. Secure Email. Master Thesis. Johor: Universiti Teknologi Malaysia; 2008.

Parashar R, Parihar PS, Kurdia V. A Attack on E-Mail Encryption Protocols by Chosen Ciphertext Method. International Journal of Internet Computing. 2011; 1(1): 65-68.

Ramaraj E, Karthikeyan S, Hemalatha M. A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA). International Journal of The Computer, the Internet and Management. 2009; 17(1): 78-86.

Federal Information Processing Standards Publications. 197. Advanced Encryption Standard. Washington DC: FIPS PUBS; 2001.

Federal Information Processing Standards Publications. 180-2. Secure Hash Standard. Washington DC: FIPS PUBS; 2002.

Gandhewar N, Sheikh R. Google Android: An Emerging Software Platform For Mobile devices. International Journal on Computer Science and Engineering. 2010; 1(1): 12-17.

Bharati JM, Hemalatha S, Aiswarya V. Advancement in Mobile Communication using Android. International Journal of Computer Applications. 2010; 1(7): 95-98.

Pandove K, Jindal A, Kumar R. Email Security. International Journal of Computer Applications. 2010; 5(1): 23-26.

Banerjee U, Vashishtha A, Saxena M. Evaluation of the Capabilities of WireShark as a Tool for Intrusion Detection. International Journal of Computer Applications. 2010; 6(7):1-5.

Bang H, Noh B. Design Approaches of Android for Students. International Journal of Computer Science and Network Security. 2010; 10(12): 225-230.

Gill S, et.al. Email Security Protocol. International Journal of Computer Trends and Technology. 2011; 1(1): 1-5.

Seth SM, Mishra R. Comparative Analysis of Encryption Algorithms for Data Communication. International Journal of Computer Science and Technology. 2011; 2(2): 292-294.

Bonner E, O’Raw J, Curran K. Implementing the Payment Card Industry (PCI) Data Security Standard (DSS). TELKOMNIKA: Indonesian Journal of Electrical Engineering. 2011; 9(2): 365-376.

Mullally A, McKelvey N, Curran K. Performance Comparison of Enterprise Applications on Mobile Operating Systems. TELKOMNIKA: Indonesian Journal of Electrical Engineering. 2011; 9(3): 503-514.

Torkaman MRN, Kazazi NS, Rouddini A. Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography. International Journal on New Computer Architectures and Their Applications. 2012; 2(1): 225-236.

Yoon HJ. A Study on the Performance of Android Platform. International Journal on Computer Science and Engineering. 2012; 4(4): 532-537.

Rasmi PS, Paul V. A Hybrid Crypto System based on a new CircleSymmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications. International Conference on VLSI, Communication & Instrumentation. Kerala. 2011; 9: 14-18.

Speckman B. The Android Mobile Platform. Master Thesis. Michigan: Eastern Michigan University; 2008.

Schneier B. Applied Cryptography. Second Edition. New York: Wiley & Sons, Inc. 1995.




DOI: http://dx.doi.org/10.12928/telkomnika.v10i4.870

Refbacks

  • There are currently no refbacks.


Copyright (c) 2014 Universitas Ahmad Dahlan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


TELKOMNIKA Telecommunication, Computing, Electronics and Control
website: http://telkomnika.ee.uad.ac.id
online system: http://journal.uad.ac.id/index.php/TELKOMNIKA
Phone: +62 (274) 563515, 511830, 379418, 371120 ext: 3208
Fax    : +62 (274) 564604

View TELKOMNIKA Stats