Abstract

Recently, mobile become the most significant device that used almost daily, and one of the most important service that offered by mobile operators is the SMS that used between mobiles, none of the mobile OS is contain a service that encrypt the send SMS where some needs to send an important, personal or secure message to the other mobile, and in this case mobiles OS needs an application to encrypt the SMS and then decrypted it on the other side. From this conception the idea of this research become to develop an application working on the devices that supports Android environment, this application encrypt the SMS before it sends from sender and then decrypt it by using the same application when it arrives to the recipient. The goal from Using the encryption Operation of the SMS is to convince that the user is using a secure SMS application that it sends an encrypted SMS where in fact that is not the truth, but the application find the loophole to take the encrypted SMS and sends the encrypted SMS to the third party (hacker) where the user will not noticed that the SMS went to the third party. Java language and an android developer tools like (ECLIPS) and other tools where used to build this application. This application is working on android environment and also needs a little space of memory and it works without leaves anything that refers to the third-party.

Highlights

  • From large enterprises and government agencies to small businesses and consumers, the use of smart phones and other mobile devices to manage professional and personal interactions is ubiquitous

  • 7- Conclusion and future Work Phishing information Began in the Internet where they are getting mail messages as well as passwords for user accounts and special information stored in computers and servers and network devices using many of Phishing Techniques at the same time several software and physical hardware was developed to detect and block attempts to computer via local networks and Internet

  • Attempts moved into the mobile phone networks where software has been developed on the potential phishing information contained within Mobile phone such as a list of names and passwords and other Special Information whether mobile connected to the internet or offline, and this software a Published in several locations on the Internet, This shows that the Android operating system contains many loopholes that can be exploited by a malicious user to work spambots, so the android operating system needs to intrusion detection systems as well as programs detect viruses

Read more

Summary

Introduction

From large enterprises and government agencies to small businesses and consumers, the use of smart phones and other mobile devices to manage professional and personal interactions is ubiquitous.

Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.