scholarly journals Analysis of Cryptography Algorithms Implemented in Android Mobile Application

2021 ◽  
Vol 50 (4) ◽  
pp. 786-807
Author(s):  
Alen Salkanovic ◽  
Sandi Ljubic ◽  
Ljubisa Stankovic ◽  
Jonatan Lerga

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.

Author(s):  
Ovidiu Constantin Novac ◽  
Iulian-Ioan Muresan ◽  
Mihaela Cornelia Novac ◽  
Mircea Petru Ursu ◽  
Mihai Oproescu ◽  
...  

2012 ◽  
Vol 260-261 ◽  
pp. 397-401
Author(s):  
Zhi Peng Shao ◽  
Shi Da Lu ◽  
Mu Chen

Introduce the status of mobile internet application in electric power corporations and current security protection methods. An in-depth analysis is made to demonstrate the possible hidden risks in the electric power smart terminals. Propose a set of electric power smart terminals protect solution and the implementation based on android operating system.


2020 ◽  
Vol 4 (1) ◽  
pp. 9-14
Author(s):  
Ali Rachman ◽  
Henny Leidiyana

Mobile devices, especially the Android operating system, are very easy to use to provide information related to work or location precisely and accurately, especially searching for the location of facilities in DKI Jakarta, such as hospitals, fire stations, restaurants, hotels, and other places. But so far the problem is often encountered related to inaccurate information reports where reports take the form of images and text without a real location statement. For this reason, it is necessary to design a mobile application that can provide detailed information about the location of several public facilities in DKI Jakarta using the Software Development Life Cycle (SDLC) method. Applications that are made can provide information that has several features including image information, title, description, location, and weather.


2021 ◽  
Vol 7 (6) ◽  
Author(s):  
Yu. Dmitrieva

This article discusses an application for mobile devices with the Android operating system that allows you to record the results of laboratory research of a synthetic chemist. An overview of the basic functionality of the Chemical Notes mobile application is presented.


Author(s):  
Serhii Tsybulnyk ◽  
Danylo Bidnyk

The development of information and computer technologies has led to the need to evolve the concept of universal bibliographic control. The creation of the Internet and web technologies has allowed this concept to reach a new level by creating a number of common international standards. In addition, to ensure control and exchange of bibliographic information public bibliographic and scientometric databases were created. Today, software for managing bibliographic records is in demand in various countries in Europe and America. The most popular software in these countries is EndNote, RefWorks, BibTeX and Zotero. The development of such automated bibliographic system and the adaptation of its functionality to standards and requirements within Ukraine is relevant for a number of reasons. The main reasons are the need for every scientist and lecturer of higher education institutions to confirm their scientific achievements when hiring, submitting scientific work to various competitions, to obtain a scientific degree and so on. Today the rapid development of information and computer technology allows us to abandon the list of scientific papers in manual mode and move to the use of specialized software on smartphones. That is why the architecture of an automated bibliographic system, which is developed as a mobile application based on the Android operating system, was designed. Java is chosen as the programming language in which the software will be written, as the vast majority of the Android operating system is written in this language. A number of technologies were chosen for the selected operating system. They will simplify the process of developing a mobile application. The three-layer architecture of the automated bibliographic system is designed on the basis of the multilevel model of architecture and the MVVM template. This architecture allows to provide the main non-functional characteristics of the quality of the developed software, as well as to effectively implement the rules of business logic within the object-oriented programming paradigm.


2021 ◽  
Vol 11 (1) ◽  
pp. 2
Author(s):  
Sam Banani ◽  
Surapa Thiemjarus ◽  
Kitti Wongthavarawat ◽  
Nattapong Ounanong

Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for continuous health monitoring. Since the sensor nodes are resource-limited, on-node processing and advertisement of digested information via BLE beacon is a promising technique that can enable a node gateway to communicate with more sensor nodes and extend the sensor node’s lifetime before requiring recharging. This study proposes a Dynamic Light-weight Symmetric (DLS) encryption algorithm designed and developed to address the challenges in data protection and real-time secure data transmission via message advertisement. The algorithm uses a unique temporal encryption key to encrypt each transmitting packet with a simple function such as XOR. With small additional overhead on computational resources, DLS can significantly enhance security over existing baseline encryption algorithms. To evaluate its performance, the algorithm was utilized on beacon data encryption over advertising channels. The experiments demonstrated the use of the DLS encryption algorithm on top of various light-weight symmetric encryption algorithms (i.e., TEA, XTEA, PRESENT) and a MD5 hash function. The experimental results show that DLS can achieve acceptable results for avalanche effect, key sensitivity, and randomness in ciphertexts with a marginal increase in the resource usage. The proposed DLS encryption algorithm is suitable for implementation at the application layer, is light and energy efficient, reduces/removes the need for secret key exchange between sensor nodes and the server, is applicable to dynamic message size, and also protects against attacks such as known plaintext attack, brute-force attack, replaying attack, and differential attack.


2018 ◽  
Author(s):  
Podjana Homhual ◽  
Sasiporn Metaweesuwan ◽  
Pramhathai Suksawang ◽  
Amon Sirikhamhom

Author(s):  
I Gusti Lanang Trisna Sumantara ◽  
I Putu Agung Bayupati ◽  
Ni Kadek Ayu Wirdiani

Balinese carving is one of the arts and culture in Bali and have various types in its application, but the lack of information resulted in people do not really know the kinds of Balinese carving. Lack of information about Balinese carvings can be solved by utilizing advances in information technology in image processing, which is to make application that can recognize Balinese carvings. Applications that made is a mobile application that can be used on smartphones with Android operating system. The method that applied is Oriented FAST and Rotated BRIEF (ORB) that able to recognize the image of Bali carving based on the features keypoints. Carved image matching using Bruteforce Hamming Distance to find the similarity between features carved images so that they can be identified. The results of the accuracy of the research process recognition Balinese carving method ORB reaches the percentage of 48% Balinese carvings recognizable and 52% did not recognize, so it can be concluded the result method ORB is quite good to recognize Balinese carving.


2020 ◽  
Vol 9 (1) ◽  
pp. 1523-1531

Commercially, innumerable consignments of valuable freight are moved across India every day. On certain routes, there is always a lurking threat to the security of the freight and finding good food is also problematic for the truckers. Truck drivers have a high rate of occupation-related injury and the highest rate of on-job fatality. This project aims to develop an android application for android operating system (OS) platform which helps drivers to get help from their passersby or forthcoming trucks and send alert to their owners if there is any threat in their routes. The Owners can monitor the movement of their trucks and the threats as well. This ensures better communication with drivers on the fleet on the same route under a single corridor. This app is developed using the platform Android Studio which is a free and open-source software.


Sign in / Sign up

Export Citation Format

Share Document