A Protocol for Secure SMS Communication for Android OS

Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 150)


By its nature, the SMS communication is insecure and the message information can be viewed of many interested parties. Here we propose a protocol for secure SMS end-to-end communication between two mobile devices. Our protocol is based on a symmetric encryption of the message context and on secure key exchange. The security of our protocol is based on the usage of already secure cryptographic algorithms:AES, SHA-2, DH-EC, and others.We have considered several possible attacks on our secure protocol and we could conclude that it is resistant of them.


End-to-end Security Encryption Mobile Communication Secure SMS 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Recommended elliptic curves for federal government use. National Institute of Standards and Technology (1999),
  2. 2.
    Specification for the advanced encryption standard (aes). Federal Information Processing Standards Publication 197 (2001),
  3. 3.
    Albuja, J.P., Carrera, E.V.: Trusted sms communication on mobile devices. Proceedings of the IEEE, 165–170 (2002),
  4. 4.
    Daemen, J., Rijmen, V.: The design of Rijndael:AES — the Advanced Encryption Standard. Springer (2002)Google Scholar
  5. 5.
    Hassinen, M., Markovski, S.: Secure sms messaging using quasigroup encryption and java sms api. In: SPLST, p. 187 (2003)Google Scholar
  6. 6.
    Herlin, H.: Method for secure communication in a telecommunications system (2000)Google Scholar
  7. 7.
    Lisonek, D., Drahanský, M.: Sms encryption for mobile communication. In: SecTech 2008, pp. 198–201. IEEE Computer Society, Washington, DC (2008), Google Scholar
  8. 8.
    Luo, T.: Method for sending a secure message in a telecommunications system (1999)Google Scholar
  9. 9.
    Ratshinanga, H., Lo, J., Bishop, J.: A security mechanism for secure sms communication. In: Conference of the South African Institute of Computer Scientists and Information TechnologistsGoogle Scholar
  10. 10.
    Research, Cetricom. Standards for efficient cryptography, SEC 1: Elliptic curve cryptography (2000)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Faculty of Computer Science and EngeenieringSs. Cyril and Methodius UniversitySkopjeMacedonia
  2. 2.NLB Tutunska BankaSkopjeMacedonia

Personalised recommendations