Full Paper View Go Back
Secure SMS Communication Using Quasigroup Algorithm
Abhishek Shetty1 , Haroon Antapur2 , Mit Chauhan3 , Nita Patil4
- Dept. of Computer Engineering, Datta Meghe College of Engineering, Airoli, India.
- Dept. of Computer Engineering, Datta Meghe College of Engineering, Airoli, India.
- Dept. of Computer Engineering, Datta Meghe College of Engineering, Airoli, India.
- Dept. of Computer Engineering, Datta Meghe College of Engineering, Airoli, India.
Correspondence should be addressed to: abhi20695@gmail.com.
Section:Research Paper, Product Type: Isroset-Journal
Vol.5 ,
Issue.4 , pp.22-24, Aug-2017
Online published on Aug 30, 2017
Copyright © Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil, “Secure SMS Communication Using Quasigroup Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.22-24, 2017.
MLA Style Citation: Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil "Secure SMS Communication Using Quasigroup Algorithm." International Journal of Scientific Research in Computer Science and Engineering 5.4 (2017): 22-24.
APA Style Citation: Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil, (2017). Secure SMS Communication Using Quasigroup Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 5(4), 22-24.
BibTex Style Citation:
@article{Shetty_2017,
author = {Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil},
title = {Secure SMS Communication Using Quasigroup Algorithm},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {22-24},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=432},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=432
TI - Secure SMS Communication Using Quasigroup Algorithm
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Abhishek Shetty, Haroon Antapur, Mit Chauhan, Nita Patil
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 22-24
IS - 4
VL - 5
SN - 2347-2693
ER -
Abstract :
This paper is on Secure SMS Communication Using Quasigroups Algorithm. We have developed an intermediate application between the bank and the user that would encrypt the data in the SMS sent by the user. Using this SMS banking service, the user can check balance or even transfer funds to someone else’s account provided both accounts are of the same banks. This will be easier to use as the account holder without a smart phone can also get fruitful results out of this. This will enable the account holder to avail banking facilities via SMS. The mobile operator is the service provider to our user. Also, the confidential information will be encrypted such that the mobile operator will not have access to the contents of the SMS.
Key-Words / Index Term :
cipher, encryption, decryption, quasigroup matrix, SMS banking
References :
[1] Smile Markovski and Aleksandra Kuzmanovska : Secure SMS Communication Based on Quasigroup Transformations , 2009.
[2] V.A. Shcherbacov : Quasigroups in Cryptology, 2009.
[3] Matthew Battey, Abhishek Parakh : An Efficient Quasigroup Block Cipher, Springer Science+Business Media New York 2012.
[4] Borujeni, S. (2000). Speech encryption based on fast fourier transform permutation. In The 7th IEEE international conference on electronics, circuits and systems, 2000 (ICECS 2000) (Vol. 1, pp. 290–293).
[5] Mosa, E., Messiha, N., & Zahran, O. (2009). Chaotic encryption of speech signals in transform domains. In International conference on computer engineering systems, 2009 (ICCES 2009) (pp. 300–305).
[6] Ian, G. S., Blake, F., & Smart, N. P. (2005). Advances in elliptic curve cryptography. Cambridge University Press.
[7] Hoffstein, J., Pipher, J., & Silverman, J. H. (1998). Ntru: A ring-based public key cryptosystem. In Lecture Notes in Computer Science (pp. 267–288). Springer: Berlin.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.