Securing peer-to-peer mobile communications using public key cryptography: New security strategy

Mobile phones are considered to be the most common communication devices in history.  Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven security solution, which can be used to secure the mobile communications. Several researchers have proposed server-based architectures public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. This paper proposes and implements a non-server (that is, P2P), architecture public key cryptography to secure the mobile communications. The proposed implementation of public key cryptography can provide confidentiality, authentication, integrity and non-repudiation security services needed for mobile communication. Compared with server based architecture, non-server based architecture has lower risk and the security has been improved, to avoid many kinds of attacks.   Key words: Public key cryptography, NTRU, peer to peer, confidentiality, authentication, integrity and non-repudiation, mobile communication security.

[1]  黒沢 馨,et al.  Low exponent attack against elliptic curve RSA , 1995 .

[2]  Marko Hassinen,et al.  Secure SMS messaging using Quasigroup encryption and Java SMS API , 2003, SPLST.

[3]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.

[4]  Dake He,et al.  Study on NTRU Decryption Failures , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[5]  M. Hassinen,et al.  Java based Public Key Infrastructure for SMS Messaging , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[6]  Narasimham Challa,et al.  Performance Analysis of Public key Cryptographic Systems RSA and NTRU , 2007 .

[7]  Yu-Fang Chung,et al.  ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.

[8]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[9]  Mohsen Toorani,et al.  SSMS - A secure SMS messaging protocol for the m-payment systems , 2008, 2008 IEEE Symposium on Computers and Communications.

[10]  Shuping Liu,et al.  Building secure user-to-user messaging in mobile telecommunication networks , 2008, 2008 Wireless Telecommunications Symposium.

[11]  Tai-Hoon Kim,et al.  Crossed Crypto-Scheme in WPA PSK Mode , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.

[12]  Rong Chen,et al.  Research on NTRU Algorithm for Mobile Java Security , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.

[13]  Chengxiang Tan,et al.  A High Security Framework for SMS , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.

[14]  B. B. Zaidan,et al.  A new hybrid module for skin detector using fuzzy inference system structure and explicit rules , 2010 .

[15]  Bilal Bahaa Zaidan,et al.  Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .

[16]  Olusegun Folorunso,et al.  Improving e-payment security using Elliptic Curve Cryptosystem , 2010, Electron. Commer. Res..

[17]  A. A. Zaidan,et al.  StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .

[18]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[19]  V. S. Shankar Sriram,et al.  Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES) , 2010 .

[20]  Frederik Vercauteren,et al.  Speed Records for NTRU , 2010, CT-RSA.

[21]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .

[22]  B. B. Zaidan,et al.  Secure Topology for Electronic Medical Record Transmissions , 2010 .

[23]  A. A. Zaidan,et al.  Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .

[24]  Miss Laiha Mat Kiah Suitability of SOAP Protocol in Securing Transmissions of EMR Database , 2010 .

[25]  Hamid A. Jalab,et al.  Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .

[26]  Abdul Monem S. Rahma,et al.  A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information , 2010 .

[27]  Zarinah Mohd Kasirun,et al.  On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .

[28]  A. A. Zaidan,et al.  SSME architecture design in reserving parking problems in Malaysia , 2010 .

[29]  B. B. Zaidan,et al.  A novel hybrid module of skin detector using grouping histogram technique for Bayesian method and segment adjacent-nested technique for neural network , 2010 .

[30]  Othman Omran Khalifa,et al.  Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .

[31]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[32]  A. A. Zaidan,et al.  Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr , 2010 .

[33]  B. B. Zaidan,et al.  Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processingand naive Bayesian classifier , 2011 .