Improving Security Using Cryptography Based on Smartphone User Locations

Anfal Mahmood, A. Nori
{"title":"Improving Security Using Cryptography Based on Smartphone User Locations","authors":"Anfal Mahmood, A. Nori","doi":"10.33899/edusj.2022.133190.1222","DOIUrl":null,"url":null,"abstract":"Smartphones have become widely employed in a range of fields as a result of substantial developments in communication technology, distribution, and the development of numerous types of smart mobile devices. The goal of this research is to secure information sent over mobile phone networks. In this paper, we propose using cryptography to create a more secure application for transmitting confidential information, using encryption to improve security, and depending on the location of the mobile phone user's coordinates, obtained via GPS, to increase security. The XOR process was used between coordinates, the idea was new, the application was implemented, and good results were obtained. The process of converting text into unreadable text is known as ciphering, and in order to achieve it in this paper the Twofish algorithm was used to encrypt confidential information. When sending the coordinates, the RSA algorithm was used to encrypt them as for the Twofish algorithm, the coordinates serve as a key. We conclude that the proposed system used in this study achieved a high level of security.","PeriodicalId":33491,"journal":{"name":"mjl@ ltrby@ wl`lm","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"mjl@ ltrby@ wl`lm","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33899/edusj.2022.133190.1222","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Smartphones have become widely employed in a range of fields as a result of substantial developments in communication technology, distribution, and the development of numerous types of smart mobile devices. The goal of this research is to secure information sent over mobile phone networks. In this paper, we propose using cryptography to create a more secure application for transmitting confidential information, using encryption to improve security, and depending on the location of the mobile phone user's coordinates, obtained via GPS, to increase security. The XOR process was used between coordinates, the idea was new, the application was implemented, and good results were obtained. The process of converting text into unreadable text is known as ciphering, and in order to achieve it in this paper the Twofish algorithm was used to encrypt confidential information. When sending the coordinates, the RSA algorithm was used to encrypt them as for the Twofish algorithm, the coordinates serve as a key. We conclude that the proposed system used in this study achieved a high level of security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用基于智能手机用户位置的加密技术提高安全性
由于通信技术、分销和多种智能移动设备的发展,智能手机已在一系列领域得到广泛应用。这项研究的目标是保护通过移动电话网络发送的信息。在本文中,我们建议使用密码学创建一个更安全的应用程序来传输机密信息,使用加密来提高安全性,并根据通过GPS获得的手机用户坐标的位置来提高安全。在坐标之间采用XOR处理,思想新颖,实现了应用,取得了良好的效果。将文本转换为不可读文本的过程被称为加密,为了实现这一点,本文使用Twofish算法对机密信息进行加密。在发送坐标时,使用RSA算法对其进行加密,对于Twofish算法,坐标作为密钥。我们得出的结论是,本研究中使用的拟议系统实现了高水平的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
38
审稿时长
24 weeks
期刊最新文献
Numerical Solution of the Fredholm Integro-Differential Equations Using High-Order Compact Finite Difference Method Implementing Runge-Kutta Method of Sixth-Order for Numerical Solution of Fuzzy Differential Equations Determining the fundamental conditions of the soliton solution for the new nonlocal discrete Separation and identification of a number of alkaloids and some phenols from two species of plants of the genus Euphorbia grown in Nineveh Governorate. Diagnosing Soft Tissue Tumors using Machine Learning Techniques: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1