LAF Chat: A Message Encrypting Application Utilizing RSA Algorithm for Android-Based Mobile Device

Main Article Content

Rowe-Ann Antenor
Robert Bautista
Francis Paolo Lesaca
Raychelou Valencia

Abstract

The researchers have decided to create an application for the sole purpose of protecting once private information even as small as a basic text message. Using the Rivest Shamir Adleman algorithm (RSA). It is an algorithm used to encrypt and decrypt messages. It uses an asymmetric cryptography algorithm which means it has 2 different keys. Algorithm involves a public key and a private key. The public key could be shared to anyone; it used to encrypt the message. Message encrypted using the public key can only be decrypted with the private key. The use of the RSA Algorithm is mainly used in banks for security purposes; the researchers have proposed and developed a program that would use the algorithm, combining it in a mobile messaging application in Android and also using Google Cloud Messaging (GCM). Security, especially when it comes to phones is a problem. Private information is something one poses in their everyday lives, and people all over the world have tried to increases security but there are also those numbers of people that have tried stealing information to use for their personal gain. Security is almost slowly becoming impossible since the rapid improvement of technology.

Article Details

Section
Research Article

References

K. I. Lakhtaria, “Protecting Computer Network with Encryption Technique: A Study,” in Ubiquitous Computing and Multimedia Applications, 2011, pp. 381–390.

K. Gary C., “An Overview of Cryptography.” [Online]. Available: https://www.garykessler.net/library/crypto.html. [Accessed: 4-Jan-2016].

Practical Cryptography: Algorithms and Implementations Using C++, Boca Raton: CRC Press, 2015.

“Cryptography Breakthrough Could Make Software Unhackable,” WIRED. [Online]. Available: https://www.wired .com/2014/02/cryptography-breakthrough/. [Accessed: 8-Feb-2016].

“What is asymmetric cryptography (public key cryptography)? - Definition from WhatIs.com,” SearchSecurity. [Online]. Available: https://searchsecurity.techtarget.com/definition/asymmetric-cryptography. [Accessed: 18-Jul-2016].

W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644–654, Sep. 2006.

“Google Cloud Messaging: Overview | Cloud Messaging,” Google Developers. [Online]. Available: https:// developers.google.com/cloud-messaging/gcm. [Accessed: 24-Jun-2016].

“History of Java Technology,” Oracle. [Online]. Available: https://www.oracle.com/technetwork/java/javase/overview/javahistory-index-198355.html. [Accessed: 25-Jan-2016].

“What is RSA algorithm (Rivest-Shamir-Adleman)? - Definition from WhatIs.com,” SearchSecurity. [Online]. Available: https://searchsecurity.techtarget.com/definition/RSA. [Accessed: 16-Aug-2016].