XTEA CRYPTOGRAPHY IMPLEMENTATION IN ANDROID CHATTING APP
DOI:
https://doi.org/10.30818/jitu.3.2.3622Keywords:
information security, cryptography, XTEA, mathematics visualizationAbstract
Information security plays a significant role in information society. Cryptography is a key proof of concept to increasing the security of information assets and has been deployed in various algorithms. Among cryptography algorithms is Extended Tiny Encryption Algorithm. This study aims to describe a recent Android Apps to realize XTEA Cryptography in mobile form. In addition, a thorough example is presented to enable readers gain understanding on how it works within our Android Apps.References
] D. Wheeler and R. Needham, TEA, a Tiny Encryption Algorithm (1994) http://www.ftp.cl.cam.ac.uk/ftp/papers/ djw-rmn/djw-rmn-tea.html
] D. Wheeler and R. Needham, XTEA (eXtended TEA), Technical report (1997)
] Y.Ko, H. Seokhie, W.Lee, S.Lee, and JS Kang. "Related key differential attacks on 27 rounds of XTEA and full-round GOST." In International Workshop on Fast Software Encryption, pp. 299-316. Springer, Berlin, Heidelberg, (2004).
] G.N. Khan, X. Yu, and F.Yuan. "A novel XTEA based authentication protocol for RFID systems." In 2011 XXXth URSI General Assembly and Scientific Symposium, pp. 1-4. IEEE, (2011).
] J.P. Kaps, "Chai-tea, cryptographic hardware implementations of xtea." In International Conference on Cryptology in India, pp. 363-375. Springer, Berlin, Heidelberg, (2008).
] M.H.AlMeer, "FPGA implementation of a hardware XTEA light encryption engine in co-design computing systems." In 2017 Seventh International Conference on Innovative Computing Technology (INTECH), pp. 26-30. IEEE, (2017).
] P.Israsena, "On XTEA-based encryption/ authentication core for wireless pervasive communication." In 2006 International Symposium on Communications and Information Technologies, pp. 59-62. IEEE, (2006).
] T.Isobe, and K.Shibutani. "Security analysis of the lightweight block ciphers XTEA, LED and Piccolo." In Australasian Conference on Information Security and Privacy, pp. 71-86. Springer, Berlin, Heidelberg, (2012).
] S.Maitra, and K.Yelamarthi. "Rapidly deployable IoT architecture with data security: Implementation and experimental evaluation." Sensors 19, no. 11 (2019.
Downloads
Published
Issue
Section
License
The proposed policy for journals that offer open access
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License