0% found this document useful (0 votes)
19 views42 pages

Final Project Report 2019

My project

Uploaded by

stevenassoro09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views42 pages

Final Project Report 2019

My project

Uploaded by

stevenassoro09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

ENCRYPTED SMS SYSTEM

By

JACOB JOHN – 229/BSC.SE/T/2016

URASA AMEDEUS GABRIEL – 236/BSC.SE/T/2016

HAMZA HAMAD– 102/BSC.IS/T/2016

LOVENESS KAZUMARI – 093/BSC.IS/T/2016

A Project Submitted in Partial Fulfillment of the Requirements for the Bachelor of Science in

Computer Science of Ruaha Catholic University

Ruaha Catholic University

August, 2019
CERTIFICATION

The undersigned certify that he has read and hereby recommend to the department of Computer
Science for acceptance by the Faculty of ICT, the project entitled “ENCRYPTED SMS SYSTEM”
in partial fulfillment of the requirements for the award of a Bachelor of Science in Computer
Science at Ruaha Catholic University (RUCU).

…………………………..

Mr. Dan Mfungo

(Supervisor)

……………………………

Mr. Dan Mfungo

(Project Coordinator)

Date………………………

i
DECLARATION & COPYRIGHT

We are hereby declaring that this project is our original work and has not been presented or
submitted to any other University or institute or published earlier except for the referenced
citations and quotations, which have been duly acknowledged.

Signature………………………………

Signature………………………………

Signature………………………………

Signature………………………………

ii
DEDICATION

We would like to dedicate this work to our beloved parents, for having taken trouble to educate
us. To our friends for their affection, support and inspiration to us which hearten to strive for
meaningful pursuits. Lastly, we would like to dedicate this work to all who have opened our way
to this success.

iii
ACKNOWLEDGEMENT

We would like to thanks the Almighty God for the care and protection he granted to us in the whole
period of our study, it is because of the glory of God that we managed to accomplish this project.
This work is a product of various contributions from different people and we are very grateful and
indebted to them. However, we feel obliged to mention some of them because without their prior
guidance, assistance and encouragement, we would never have been able to finish this project.

We give many thanks to our supervisor, Mr. Dan Mfungo for the guidance, inspiration and
constructive suggestions that helps us in the whole way of doing this project.

Special gratitude and appreciation should go to our project coordinator Mr. Dan Mfungo, head of
department of computer science Madam Jane Girittu and dean of faculty of ICT Dr. Sylivano C.N
Kitinya for their efforts on providing us go ahead to the study area. We would also like to extend
our sincere thanks to our colleagues and our families for their cooperation during the course.
Lastly, we recognize any contribution of any kind or support to this study from anyone, and all
efforts are highly appreciated.

iv
ABSTRACT

Encrypted SMS is an advanced Encryption and decryption System targeting the SMS for Android
Users both sender and receiver. The User can send an Encrypted message while he can decrypt an
encrypted message. When we live in a global village, then maintaining privacy and confidentiality
becomes reasonably challenging. Short Message Service (SMS) is the oldest application for
exchanging messages between communicating parties in cellular network used by mobile phones.
These messages are encrypted over-the-air with A5/1 algorithm and stored as clear text at network
operator. Recent developments have shown that this algorithm is not secure any more.
Compromising an access to network operator registers gains access to SMS also. Current scenarios
of hacks and exploitation demands confidentiality, and encryption is one of the techniques, which
is used, in this subsequent project of designing a secure SMS android application. Cryptographic
manipulation of the data is performed using AES 128 -bit algorithm to secure the data, which is
essential to us and the safe transmission of confidential data over the GSM network. AES
(Advanced Encryption Standards) algorithm is the considered impregnable even to super
computers brute force attacks. The AES algorithm technique uses very befuddled and sporadic
encryption making data impregnable to attackers or hackers. This android app will
allow the user to encrypt and decrypt the SMS (Short Message Service) efficiently and just at one
click.

v
TABLE OF CONTENTS

CERTIFICATION ........................................................................................................................... i

DECLARATION & COPYRIGHT ................................................................................................ ii

DEDICATION ............................................................................................................................... iii

ACKNOWLEDGEMENT ............................................................................................................. iv

ABSTRACT.................................................................................................................................... v

TABLE OF CONTENTS............................................................................................................... vi

LIST OF FIGURERS..................................................................................................................... ix

LIST OF TABLES .......................................................................................................................... x

ABBREVIATIONS AND ACRONYMS ...................................................................................... xi

CHAPTER ONE ............................................................................................................................. 1

INTRODUCTION ....................................................................................................................... 1
1.1 Introduction ........................................................................................................................... 1
1.2 Background of the problem ................................................................................................... 2
1.3 Problem Statement ................................................................................................................ 3
1.4 Objectives of the Project ....................................................................................................... 4
1.4.1 Main Objectives .............................................................................................................. 4
1.4.2 Specific Objectives ......................................................................................................... 4
1.5 Purpose of the project............................................................................................................ 4
1.6 Significance of the project..................................................................................................... 4
1.7 Assumption and limitation .................................................................................................... 5
1.8 Scope of the Project............................................................................................................... 5
CHAPTER TWO ............................................................................................................................ 6

LITERATURE REVIEW ............................................................................................................ 6


2.1 Introduction ........................................................................................................................... 6
2.2 Related Systems .................................................................................................................... 9
2.2.1 WMkitsSMS Encryption ................................................................................................ 9
2.2.2 Secure SMS .................................................................................................................... 9

vi
CHAPTER THREE ...................................................................................................................... 10

METHODOLOGY .................................................................................................................... 10
3.1 Introduction ......................................................................................................................... 10
3.1.1 Implementation models ................................................................................................ 10
3.1.2 Prototype design ........................................................................................................... 10
3.2 Requirement specification ................................................................................................... 12
3.2.1 Function Requirements ................................................................................................. 12
3.2.2 Non-function requirement ............................................................................................ 12
3.3 Hardware and Software Requirements ................................................................................ 13
3.3.1 Hardware requirements................................................................................................. 13
3.3.2 Software requirements .................................................................................................. 14
3.4 Development Tools ............................................................................................................. 14
3.5 Data requirements ............................................................................................................... 15
3.6 Data Collection techniques.................................................................................................. 15
CHAPTER FOUR......................................................................................................................... 16

SYSTEM DESIGN AND IMPLEMENTATION ..................................................................... 16


4.1 Data Flow Diagram ............................................................................................................. 16
4.1.1 DFD LEVEL 0.............................................................................................................. 16
4.1.2 DFD LEVEL 1.............................................................................................................. 16
4.2 Interface Design .................................................................................................................. 17
4.2.1 Input Design ................................................................................................................. 18
4.2.2 Output Design ............................................................................................................... 18
4.3 Use Case diagrams .............................................................................................................. 19
4.4 Development Team and Role of each Team Member......................................................... 19
CHAPTER FIVE .......................................................................................................................... 20

SYSTEM TESTING AND MAINTENANCE ......................................................................... 20


5.1 System Testing .................................................................................................................... 20
5.2 Software Application Testing.............................................................................................. 20
5.3 System Maintenance ........................................................................................................... 22
5.3.1 Corrective Maintenance ................................................................................................ 22
5.3.2 Perfective Maintenance ................................................................................................ 22
5.3.3 Preventive Maintenance ............................................................................................... 22

vii
CHAPTER SIX ............................................................................................................................. 23

CONCLUSION AND RECOMMENDATIONS ...................................................................... 23


6.1 Conclusion........................................................................................................................... 23
6.2 Recommendations ............................................................................................................... 23
REFERENCES ............................................................................................................................. 24

APPENDIX ................................................................................................................................... 25

Time Schedule ........................................................................................................................... 25


Cost Benefit Analysis ................................................................................................................ 25
User Manual of Encrypted SMS System .................................................................................. 26

viii
LIST OF FIGURERS

Figure 1: Diagram of Symmetric Block Cipher .............................................................................. 8


Figure 2: Prototype 1 sender interface .......................................................................................... 10
Figure 3: Prototype 2 sender interface .......................................................................................... 11
Figure 4: Prototype 1 receiver interface........................................................................................ 11
Figure 5: Prototype 2 receiver interface........................................................................................ 11
Figure 6: Data Flow Diagram Level 0 .......................................................................................... 16
Figure 7: Data Flow Diagram Level 1 .......................................................................................... 17
Figure 8: Input Design .................................................................................................................. 18
Figure 9: Output Design................................................................................................................ 18
Figure 10: Use case diagram for Encrypted SMS ......................................................................... 19
Figure 11: Gantt Chart for Project Developer............................................................................... 25
Figure 12: User Manual Installation Process Step 1 ..................................................................... 26
Figure 13: User Manual Installation Process Step 2 ..................................................................... 26
Figure 14: User Manual Installation Process Step 3 ..................................................................... 27
Figure 15: User Manual Encrypt Message Step 1 ........................................................................ 27
Figure 16: User Manual Encrypt Message Step 2 ........................................................................ 28
Figure 17: User Manual Encrypt Message Step 3 ........................................................................ 28
Figure 18: User Manual Encrypt Message Step 4 ........................................................................ 29
Figure 19: User Manual Decrypt Message Step 1 ........................................................................ 29
Figure 20: User Manual Encrypt Message Step 2 ........................................................................ 30

ix
LIST OF TABLES

Table 1: Review on SMS Encryption ............................................................................................. 8


Table 2: Hardware Requirement for User ..................................................................................... 13
Table 3: Software Requirement for user ....................................................................................... 14
Table 4: Development Tools needed for Developers ................................................................... 14
Table 5: Development Team and Role of each Team Member .................................................... 19
Table 6: Development cost estimates ........................................................................................... 25

x
ABBREVIATIONS AND ACRONYMS

SMS Short Message Service


ICT Information and Communication Technology
IDE Integrated Development Environment
RUCU Ruaha Catholic University
UML Unified Modelling Language
SSL Secure Socket Layer
GSM Global System for Mobile

xi
CHAPTER ONE

INTRODUCTION

1.1 Introduction
Communication has always been a crucial factor in development of human's everyday life. Since
prehistoric times human society developed different forms of communication which made possible
exchanging meaningful information between individuals, and, as a result, they put in function the
society itself. At those times fire, smoke signals, horns etc. were used as communication tools and
techniques. Moreover, the appearance of speech made a revolution in human communication. In
addition, symbols and writing further revolutionized communication. They led to new
communication techniques like mail, pigeon post etc. The technology innovations further
improved and made communication more powerful. First the telegraph then the telephone made
communication quite simple even in long distances. Furthermore, the internet extremely boosted
the communication and made it easier than ever before. Telephone is considered to be one of the
most important invention that revolutionized communication. First telephone was introduced with
the landline version where all telephones were connected by wires but, later it evolved to the
wireless version. SMS is a text messaging service component of phone, web, or mobile
communication systems, using standardized communications protocols that allow the exchange of
short text messages between fixed line or mobile phone devices. Users can used SMS to send or
receive from a single person, or several persons, personal messages, email notifications,
information services, school activity alerts, notification from teacher, job dispatches, and also
stock alerts. With these usable applications, SMS is now more and more common among mobile
phone users. However, the security issue of SMS’s is still an open challenging task. SMS is now
a very common communication tool. The security protection of SMS messages is not yet that
sophisticated and difficult to implement in practice. The confidentiality and integrity mechanism
are only specified as optional security measures that can be made available, but they are not
mandatory requirements for SMS system implementation. In our project we implement the use of
symmetric cryptography for SMS transfer to secure the information transferred using advanced
Encryption standard.

1
1.2 Background of the problem
Many times, when data is exchanged electronically the privacy of the data is a requirement. The
use of encryption restricts unintended recipients from viewing the data, which are deemed
confidential and potentially dangerous if made known to irresponsible parties. Today, encryption
is the procedure of transforming plaintext, data that can be read by anyone, to cipher text, data that
can only be read by someone with a secret decryption key. A message before being changed in
any way is called plaintext. Plaintext messages are converted to cipher text via some encryption
method. A particular such method is called a cryptosystem. Encryption today is highly competitive
businesses often require that extensive security measures be put into place. And, those who wish
to exercise their personal freedom, outside of the oppressive nature of governments, may also wish
to encrypt certain information to avoid legalities that entailed possession of such. This final year
project is concentrated on Text Messaging Encryption System. Currently SMS is being widely
used as a fast and convenient communication tool. There is no age barrier in using this SMS service
which starts from small kid till elderly people. When this is the case, there is no security for
messages transmitted over hand phones on the required parties by email or verbally in person. This
delays time and efficiency in crucial business operations. Since there is no security for the
messages, it indirectly leads to a lot of problems where important and confidential information
such as passwords is being accessed by unauthorized individual. Apart from all that, there are also
some other cases like the mobile phone owner accidently send messages to the wrong number and
it gets worse when the mobile gets stolen. By implementing this encryption system, security of
private and confidential data will be solved. This system is not only meant for public use but it is
also focused on banking and commerce sectors as well where this system is more in need to
basically interact with their customers. This system will be targeted to be very user friendly in
where it will be very easy to handle and provides good security at the same time. Due to this reason,
more people will get to know about the product and it is believed to be utilized in an appropriate
way.

2
1.3 Problem Statement
Although it is widely used, there is no security for messages transmit over hand phones at moment
unless the users take their own initiative to install encryption software which is available in the
market. As for now, few people realize the existence of encryption software’s in the market. They
do not know on how to really utilize it and how secure it as well. SMS encryption is required to
provide security for confidential information to be sent over hand phones. Confidential information
or instructions can only be safely passed on to the required parties by email or verbally in person.
This delays time and efficiency of crucial business operations. Currently messages in phone can
easily be read if the phone is stolen, or users might simply send and receive private information.
At present, banking, commerce and passwords can only be communicated with internet connection
or as in person verbally or in written. SMS helps to overcome these intermediate subjects and
deliver instructions or messages instantaneously and securely. After analyzing the above stated
problem, this system will encrypt and decrypt the messages which are sent through mobile devices
using GSM connection. This mobile application starts off the user will type the message in the
encryption system which will then be then sent out to the intended recipient by entering their phone
number. The recipient will receive the message in the form of cipher text which will be then copied
to the system to decrypt it and get the original message back using the same SMS Encryption
system installed in his/her mobile phone. Since the messages are being encrypted, it provides a
good security system. The system basically concentrates on providing 1st level of security for the
text message content itself which can be private and confidential in so many situations as fraud
cases based on this can be listed down. This is the part where the user will be able to encrypt and
decrypt the messages from the developed system which protects their valuable data. Other than
that this system would be providing security at initial point on 2nd level security which
concentrates on user authentication. This is basically done to avoid unauthorized access if someone
else attending the phone instead of the real user if the phone gets stolen. This is possible because
only the 4 original user have the unique username and password which was registered earlier in
the system.

3
1.4 Objectives of the Project

1.4.1 Main Objectives


To develop a system which will provide security for normal SMS through encryption and
decryption techniques with Advanced encryption standard algorithm which is targeted to prevent
information breach to take place in the case where communication of private and confidential data.

1.4.2 Specific Objectives


 To design and develop user interface which will enable the sender of message to enter
required.
 To implement the existing broadcast receiver class on android software development kit
(sdk) that facilitate the sending and receiving process of Short message service in android
projects
 To implement algorithm that enable encryption and decryption of the message content
 To test the application with the existing normal android SMS application

1.5 Purpose of the project


To provide a secure environment for sent and receive SMS through global system for mobile
(GSM) which will prevent anyone from monitoring your text conversation by encrypting the
message content as it pass by from one message center to another until it reaches to intended
recipient

1.6 Significance of the project


 The system provide end to end security for normal SMS means that the message content
will be encrypted at one end the sender side and decrypted at another end receiver side by
using AES
 To ensure privacy of information sent via public GSM network
 To improve efficiency of private communication by ensuring the integrity of SMS sent

4
1.7 Assumption and limitation
 The system is for only for Android smartphones.
 Both sender and recipient need to have the software installed in their phones
 The receiver need to know the secret key used to encrypt the message

1.8 Scope of the Project


The scope of this project is design, implement and come up with the prototype of the standalone
application that will concentrate mainly on encryption and decryption function for SMS using
AES.

5
CHAPTER TWO

LITERATURE REVIEW

2.1 Introduction
Smartphones’ market is growing exponentially as well as the operating systems like android and
iOS, which run them. Regular updates are delivered to the users that provide services and security
and keep them up to date in case of any new threat or breakthrough. Now communication is a big
area itself and is of extreme importance considering military, governmental and political
communication and also the daily personal information one doesn’t want to share with others;
there comes the secure methods of transferring information like encryption so that no unwanted
listener hears or read what you have to say or write. There are multiple encryption schemes and
algorithms available all around like blowfish, RC4, but being considered the most secure and
efficient is AES (Advanced Encryption Standard) and is widely used for military grade encryption
and other secure communication purposes. There are three variants available of the AES i.e. AES-
128, AES-192, AES-256. The number represent the bits and the higher the bits more befuddling
and mingling of data happens. For the lightweight apps like SMS encryption AES 128 is quite
sufficient to handle and it do provide the fool proof security. Recent trends in enterprise mobility
have made mobile device security an imperative. IDC reported in 2010 for the first time
smartphone sales outpaced PC sales. Faced by this onslaught of devices and recognizing the
productivity and cost benefits, organizations are increasingly implementing bring-your-own
device (BYOD) policies. Research firm J. Gold Associates reports that about 25%-35% of
enterprises currently have a BYOD policy, and they expect that to grow to over 50% over the next
two years.

This makes sense as mobility evolves from a nice-to-have capability to a business advantage. But
the competitive edge and other benefits of mobility can be lost if smartphones and tablet PCs are
not adequately protected against mobile device security threats. While the market shows no sign
of slowing, IT organizations identify security as one of their greatest concerns about extending
mobility. Therefore, various encryption techniques are used. Encryption has long been used by
militaries and governments to facilitate secret communication. Encryption is now commonly used
in protecting information within many kinds of civilian systems. For example, the Computer

6
Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some
of their data in transit, and 53% utilized encryption for some of their data in storage Encryption
can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash
drives). In recent years there have been numerous reports of confidential data such as customers'
personal records being exposed through loss or theft of laptops or backup drives. Encrypting such
files at rest helps protect them should physical security measures fail. Digital rights management
systems which prevent unauthorized use or reproduction of copyrighted material and protect
software against reverse engineering are another somewhat different example of using encryption
on data at rest. In 2010, 6.1 trillion SMS text messages were sent. This translates into 192,192
SMS per second. SMS has become a massive commercial industry, worth over $81 billion globally
as of 2006.The global average price for an SMS message is $0.11, while mobile networks charge
each other interconnect fees of at least $0.04 when connecting between different phone networks.
The SMS industry being on such a great rise is vulnerable to attacks. Therefore it has now become
more imperative to encrypt SMS before sending. Various algorithms for encryption and decryption
are in place. Out of the entire group of algorithm AES is the most preferred one. AES require very
low RAM space and very fast. On Pentium Pro processors AES encryption requires only 18 clock
cycles/byte equivalent to throughput of about 11Mib/s for 200MHz processor.

This was the main reason why we decided to use AES algorithm for encryption and decryption.
The field of cryptography can be divided into several techniques of study. There are two types of
techniques in cryptography which are asymmetric key algorithm and symmetric key algorithm.
Asymmetric key algorithm or sometimes called public key algorithm is usually based on complex
mathematical problems. Symmetric key algorithm can be broadly grouped into block ciphers and
stream ciphers. Other symmetric key algorithms are cryptographic hash functions and Message
Authentication Codes (MACs).

7
Figure 1: Diagram of Symmetric Block Cipher

In the literature as shown in Tab. 1, many authors have used different cryptography algorithms in
the SMS encryption application to provide confidentiality in sending and receiving messages. Even
though there are several authors (2 out of 8) used DES, 3DES and AES block cipher algorithms in
their works but most of these works are asymmetric key encryption techniques. Therefore, it is
advisable that can develop SMS Encryption using symmetric key encryption.

Table 1: Review on SMS Encryption

Author Algorithm
Lisonek & Drahansky RSA
Albuja & Carrera DES, 3DES, AES and RSA
Toolani& Shirazi ECDLP
Zhao et al identity-based
Harb et al 3DES
Sonam Elleptic Curve
Hosain et al SMS Sec

Owning from suggestion of Garza-Saldana & Diaz-Perez that symmetric encryption could provide
confidentiality to SMS, this paper perform an evaluation of three block cipher symmetric
encryption techniques. This is done in order to find the most suitable block cipher symmetric
encryption technique for securing SMS transmitted messages.

8
2.2 Related Systems
2.2.1 WMkitsSMS Encryption
WMkitsSMS Encryption is professional text messages encryption software for Windows Mobile
phones. It can encrypt and hide the SMS messages (including existing SMS messages and future
incoming/outgoing SMS messages) on the windows mobile devices. The hidden SMS messages
are encrypted and will be stored separately. You can only decrypt and show your messages with a
correct password. That means, others cannot view any of your secret or important SMS messages
on your mobile phone without your approval, even if you lost your phone or lend your mobile
phone to your friend or relative. Your privacy will be safe.

2.2.2 Secure SMS


Secure SMS is a simple to use, but extremely sophisticated software that provides you with
complete security when sending and receiving SMS text messages. Secure SMS solution is ideal
for both individuals and businesses that care about their privacy. Secure SMS fully protects you
from commercial espionage, governments, mobile phone companies, and any third parties (using
GSM interception systems) who seek to discover any sensitive information or private
correspondence. In short Secure SMS is your one-stop-shop for sending and receiving all your text
messages in complete confidence that you are the sole recipient. All your text messages transferred
over the GSM or CDMA networks will be encrypted (end to end encryption).

9
CHAPTER THREE

METHODOLOGY

3.1 Introduction
A methodology is a model, which project development team employ for the design, planning,
implementation and achievement of their project objectives.
Choosing the appropriate methodology for software projects always plays a huge role in
determining the success of software product (Sommerville 2004). In the development of Encrypted
SMS mobile application, various factors were put into consideration before settling on Agile
prototype development methodology.

3.1.1 Implementation models


The project adopted Agile prototype development methodology. The Encrypted SMS system was
given to users at various stages. This made it to involve early development of the user interface to
allow users to interact will the proposed mobile application before completion and made changes
where necessary.

3.1.2 Prototype design


For Encrypted SMS application we were able to develop prototype designs. These designs
reflected the system in terms of content, structure, design and navigation layout.

Figure 2: Prototype 1 sender interface

10
Figure 3: Prototype 2 sender interface

Figure 4: Prototype 1 receiver interface

Figure 5: Prototype 2 receiver interface

11
3.2 Requirement specification
Is a detailed description of a software system to be developed with its functional and non-
functional requirements, requirement specifications developed based the agreement between
customer and developer It may include the use cases of how user is going to interact with software
system.

3.2.1 Function Requirements


Functional requirements are fundamental building block requirements. It is a statement of exactly
what the system must do. The new system will take care of the following functional requirements
 The system shall enable user to receive decrypted SMS
 The system shall enable the user to send encrypted SMS
 The system shall allow user to decrypt received Encrypted SMS
 The system shall allow user to view both Encrypted and decrypted SMS

3.2.2 Non-function requirement


Non-functional requirement describes the aspects of the system that are not directly related to the
user. Unlike functional requirement the non-functional requirement deals with additional quality
of the system such as

Performance
The performance of the Application can be determined by it responsive time, time to complete the
given task.
For example, in startup application it should not take more than 3 second to load initial screen.
Also, it should be made to ensure that app will facilitate to the user Input smoothly.

Capacity and Scalability


We considered how much the app needs to cope with now, and how much it might need to cope
with in the future.
Growth requirements: Because it cannot be truly known how popular the app is going to be until
it is out there, predictions and estimates had to be made about how successful the app is going to
be using collected data.

12
Responsiveness
Application should be responsive to the user Input or to any external interrupt which is of highest
priority and return back to same state.
For example:- When app gets interrupted by call, then app should be able to save state and return
to same state/ page which was there before it got interrupted.

Availability
There should be a common plane where the user can access your application to install and look for
regular updates give feedback
For example: - Google’s Play Store

Screen Adaption
Now days lot of mobile devices comes with different screen sizes and layout, our application will
be able to render it’s layout to different screen sizes. Along with automatic adjustment of Font size
and image rendering.

Security
This aspect considers intended collection and utilization of data by authorized individuals. The
system performs security measures using by performing validation of input and encryption of
message content using AES.

3.3 Hardware and Software Requirements


3.3.1 Hardware requirements
When a user want to use Encrypted SMS Application he/she need the following hardware
Table 2: Hardware Requirement for User

HARDWARE REQUIREMENTS
RAM 500MB
Storage space 1GB
Smart phone Resolution - 480 * 800 pixel
CPU – Dual core 1.2 GHz or higher

13
3.3.2 Software requirements
The user Device should have the following

Table 3: Software Requirement for user

SOFTWARE REQUIREMENTS
Operating System Android 4.2 (jelly Bean or higher)

3.4 Development Tools


Since our project is application development. The following are the Tools needed for Developing
Encrypted SMS System.
Table 4: Development Tools needed for Developers

Item Applied for

Tools

Android Studio IDE

Dia / Microsoft Exel Drawings

JDK, Android SDK Runtime Environment

Notepad++ Text Editor

Languages

Java System Logic

XML Input and Output Forms

14
Hardware

Hard Disk - 10 GB or more, 1.4GHz or more, Hardware specifications(Computer)


RAM – 4 GB or more.

Software

Windows 7 or higher Operating system

3.5 Data requirements


The application requires user to enter data for it to continue with encryption process the data that
user provide are recipient phone number which used to specify the recipient of the message, secret
key which is used for encryption and message content.

3.6 Data Collection techniques


Consists of techniques and tools that are used to collect the needed data for the development of the
project.
Observation
Is the act of watching processes being performed by existing system is a powerful tool to gain
In sight into the as-is system. Observation enables the analyst to see the reality of a situation, rather
than listening to others describe it in interviews or any other means.
In our project we use observation as a means of collecting data because our application is based
on improving normal android SMS application so we observe how it works and what process are
taken until the message is sent to recipient.

15
CHAPTER FOUR

SYSTEM DESIGN AND IMPLEMENTATION

4.1 Data Flow Diagram


A data-flow diagram (DFD) is a way of representing a flow of a data of a process or a system
(usually an information system).The DFD also provides information about the outputs and inputs
of each entity and the process itself. A data-flow diagram has no control flow, there are no decision
rules and no loops

4.1.1 DFD LEVEL 0


A level 0 data flow diagram (DFD), also known as a context diagram, shows a data system as a
whole and emphasizes the way it interacts with external entities.

Figure 6: Data Flow Diagram Level 0

4.1.2 DFD LEVEL 1


A level 1 data flow diagram (DFD) is more detailed than a level 0 DFD but not as detailed as a
level 2 DFD. It breaks down the main processes into sub processes that can then be analyzed and
improved on a more intimate level.

16
Figure 7: Data Flow Diagram Level 1

4.2 Interface Design


The goal of interface design is to define the set of interface objects and actions i.e. Control
mechanisms that enable the user to perform desired tasks. Indicate how these control mechanisms
affect the system. Specify the action sequence of tasks and subtasks, also called a user scenario.
Indicate the state of the system when the user performs a particular task. Interface design serves
as the foundation for the implementation of a project.

17
4.2.1 Input Design

Figure 8: Input Design

Input Device
 Smartphone Keyboard (eg. Swiftkey Keyboard, Big Buttons Keyboard, etc)

4.2.2 Output Design

Figure 9: Output Design

Output Device
 Screen

18
4.3 Use Case diagrams
Use case diagrams are used to gather the requirements of a system including internal and
external influences. These requirements are mostly design requirements. Hence, when a system
is analyzed to gather its functionalities

Figure 10: Use case diagram for Encrypted SMS

4.4 Development Team and Role of each Team Member


The TMS has been developed by group of four people where each member has played a role in
the development process of the system. The following are the activities that were performed by
group members to develop TMS.
Table 5: Development Team and Role of each Team Member

MEMBER ACTIVITIES
 System Analysis
HAMZA HAMAD
 Report Writing
URASA AMEDEUS GABRIEL  System Design
&  Integration and System Testing
LOVENESS KAZUMARI  Report Writing
 Coding
JACOB JOHN  Unit Testing
 Report Writing

19
CHAPTER FIVE

SYSTEM TESTING AND MAINTENANCE

5.1 System Testing


Testing is a process by which application software developed for hand held mobile devices is
tested for its functionality, usability and consistency. Mobile application testing can be automated
or manual type of testing. Mobile applications either come pre-installed or can be installed from
mobile software distribution platforms. Mobile devices have witnessed a phenomenal growth in
the past few years. Types of Application Testing. The following types of testing are performed on
applications.

5.2 Software Application Testing

For the sake of software testing both black box testing methodology as well as white box testing
is implemented because there was a need to carry out tests to both sides of the application, the
internal and the functional one. Black box testing includes wrong input of key, incomplete key and
empty message scenario testing. The application does respond to these tests efficiently. White box
testing helped to improve the code and removal of errors and bugs.

Usability testing

To make sure that the mobile app is easy to use and provides a satisfactory user
experience to the customers. Usability testing is carried out to verify if the application is achieving
its goals and getting a favorable response from users. This is important as the usability of an
application is its key to commercial success. According to the user view this is more reliable and
easy to understand that encrypted message is being sent.

Compatibility testing
Testing of the application in different mobiles devices, browsers, screen sizes and OS versions
according to the requirements. It is supporting in different company android mobiles, different
version of OS (version 4.0 and above) and screen resolution compatibility is 240 *432.

20
Interface testing
Testing of menu options, buttons, bookmarks, history, settings, and navigation flow of the
application. Buttons, text fields are successfully working.

Services testing
Testing the services of the application is offline.

Low level resource testing


Testing of memory usage, less time, less data are required for this application. Total size of the
software is to be less after installing in android device.

Performance testing
Testing the performance of the application by changing the connection from 2G, 3G to WIFI,
battery consumption, etc.

Installation tests
Validation of the application by installing /uninstalling it on the different versions of devices and
different versions of operating system.

Security Testing
Testing an application to validate if the information system protects data or not. Here as sending
the encrypted message so it is maintaining high security.
 GUI (Graphical User Interface) is very attractive to user and easy to implement.
 Emulators – The use of these is extremely useful in the initial stages of development, as
they allow quick and efficient checking of the app. Emulator is a system that runs software
from one environment to another environment without changing the software itself. It
duplicates the features and work on real system.

21
5.3 System Maintenance
Maintenance it stands for all modification and updating done after the delivery of software product
of the Encrypted SMS will be conducted regularly to ensure that the system continue to perform
its operation even after failure or to cope with changes. Type of maintenance that can be made to
Encrypted SMS system are as follow

5.3.1 Corrective Maintenance


Performed to return the system proper working order in case of system failure or breakdown
therefore the presence of backup copies of software will help to restore the system to its proper
working order.

5.3.2 Perfective Maintenance


Performed in order to improve the performance of the system. In case of our system, perfective
maintenance can be performed by modifying the system through adding a database to the system
in order to keep the record of SMS conversation (both sent and received message).

5.3.3 Preventive Maintenance


Performed to prevent the system from the failure before the actual failure happen. In case of our
system, preventive maintenance involves maintaining accurate and valid input.

22
CHAPTER SIX

CONCLUSION AND RECOMMENDATIONS

6.1 Conclusion
The application of SMS Encryption of AES block cipher on android application has been designed
and implemented. The application is running in the mobile phone and does not require any
additional encryption devices. The result showed that suitable and easy to implement in mobile
device for the proposed scheme. With the increasing use of SMS for communication and
information exchange, care should be taken when sensitive information is transmitted using SMS.

6.2 Recommendations
Users should be aware that SMS messages might be subject to interception. So if there is a need
to send sensitive information via SMS we suggest to use Encrypted SMS because it provide end
to end encryption with Encrypted SMS even if the third party intercept the message won’t be able
to read the message without the application and secret key and also service provider will not be
able to read the content of the message as the message pass by for transfer in message center hence
it increase message privacy.

23
REFERENCES

J. Daemen, V. Rijmen, V., “The Design of Rijndael, AES - The Advanced Encryption Standard”,
Springer-Verlag, 2002.
NIST, “Fips197: Advanced Encryption Standard (AES)”, FIPS PUB 197 Federal Information
Processing Standard Publication 197, Technical report, National Institute of Standards and
Technology,
2001.
M. A. Hossain, S. Jahan, M. M. Hussain, M.R. Amin, and S.H. S Newaz, “A proposal for
enhancing the
security system of short message services in GSM”, 2nd International Conference on
Anticounterfeiting, Security and Identification, ASID, Guiyang, China, 2008, pp. 235- 240.
D. Lisonek and M. Drahansky, “SMS encryption for mobile communication”, International
Conference
on Security Technology, Hainan Island, 2008, pp 198 – 201.

24
APPENDIX

Time Schedule
For our project we used Gantt chart tool that enabled us to successful complete the project we
undertake. Gantt Chart this is the project tool which is used to show the project tasks and when
each task must take place and how long each will each take to complete.

GANTT CHART
Duration(days)
11-Mar 31-Mar 20-Apr 10-May 30-May 19-Jun 09-Jul 29-Jul 18-Aug

Analysis

Design
Tasks

IDE Installation

Coding

Testing

Figure 11: Gantt Chart for Project Developer

Cost Benefit Analysis


Table 6: Development cost estimates

ITEM COST
System Analysis -
Computer -
Smart Phones -
Development Cost 40,000/=
Testing -
TOTAL 40,000/=

25
User Manual of Encrypted SMS System
This document will help user to use Encrypted SMS Application to Install, Send Encrypted
Message from Sender Side and Decrypt Message from Receiver Side.

 Installation process
Step 1: After receive Application on your Phone click EncDecSMS APK and the following
Screen will appear

Figure 12: User Manual Installation Process Step 1

Step 2: Click Install at bottom right in your screen appeared on Step 1 and the Application
start installing. The following Screen will appear.

Figure 13: User Manual Installation Process Step 2

26
Step 3: After Finish Installing the EncDecSMS Application the following screen will
appear then click done at bottom left of your screen and already installed Encrypted SMS
successfully on your phone.

Figure 14: User Manual Installation Process Step 3

 Encrypted SMS usage


i) From a sender side
Step 1: After successful installation of application browse application on your Phone and
then click Encrypted SMS. The following Screen will appear.

Figure 15: User Manual Encrypt Message Step 1

27
Step 2: Enter the recipient’s phone number the person to whom the message is intended to.

Figure 16: User Manual Encrypt Message Step 2

Step 3: Enter the secret key the key should be 16 characters not less no more
NB: both the sender and the receiver must share their secret keys

Figure 17: User Manual Encrypt Message Step 3

28
Step 4: write your message and click send which will encrypt your message using the key
you provide in step 3

Figure 18: User Manual Encrypt Message Step 4

ii) On recipient side

Step 1: When the message is received to recipient phone the following screen will open

Figure 19: User Manual Decrypt Message Step 1

29
Step 2: Enter secret key which was used to encrypt the message to decrypt the message
content and click submit.

Figure 20: User Manual Encrypt Message Step 2

30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy