{"title":"使用Ellipic曲线加密技术增强安卓系统的安全性","authors":"M. Dar, J. Parvez","doi":"10.14257/IJSIA.2017.11.6.03","DOIUrl":null,"url":null,"abstract":"Android has become an active area of research owing to its vast range of applications called apps. Traditional security protocols which are complex are not feasible for such systems due to the limitation of resources. However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. Android operating system has been used to develop custom security protocols on a Smartphone. The performance benchmarking of the proposed protocols has also been carried out.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Security Enhancement in Android using Ellipic Curve Cryptography\",\"authors\":\"M. Dar, J. Parvez\",\"doi\":\"10.14257/IJSIA.2017.11.6.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Android has become an active area of research owing to its vast range of applications called apps. Traditional security protocols which are complex are not feasible for such systems due to the limitation of resources. However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. Android operating system has been used to develop custom security protocols on a Smartphone. The performance benchmarking of the proposed protocols has also been carried out.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.6.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.6.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Enhancement in Android using Ellipic Curve Cryptography
Android has become an active area of research owing to its vast range of applications called apps. Traditional security protocols which are complex are not feasible for such systems due to the limitation of resources. However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. Android operating system has been used to develop custom security protocols on a Smartphone. The performance benchmarking of the proposed protocols has also been carried out.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security