secure text transfer via bluetooth using hybrid...

24
SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID ENCRYPTION FAKHRUL HAKIMI B SAIDI CA09095 FACULTY OF COMPUTER SYSTEMS & SOFTWARE ENGINEERING UNIVERSITI MALAYSIA PAHANG

Upload: others

Post on 14-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID

ENCRYPTION

FAKHRUL HAKIMI B SAIDI

CA09095

FACULTY OF COMPUTER SYSTEMS & SOFTWARE ENGINEERING

UNIVERSITI MALAYSIA PAHANG

Page 2: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

iii

SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID

ENCRYPTION

FAKHRUL HAKIMI B SAIDI

A thesis submitted in fulfilment of the requirements

for the award of the degree of

Bachelor of Computer Science(Computer System and Networking)

Faculty of Computer Science & Software Engineering

UNIVERSITY MALAYSIA PAHANG

Page 3: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

vii

ABSTRACT

Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure the

text before it transfer via Bluetooth. This system helps the user to secure their text using

hybrid encryption. Hybrid encryption will make the text become more secure because it

uses the combination of two encryption algorithm. This system content 2 layer of

encryption and decryption. Besides that, this system also ensures only the true receiver

wills receiver the text. During Bluetooth connection, the user must change their key

passkey.

Page 4: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

viii

ABSTRAK

Keselamatan Penghantaran Perkataan Melalui Bluetooth Menggunakan Gabungan

Penyulitan ialah sistem untuk memberi keselamatan kepada perkataan sebelum

menghantar melalui Bluetooth. Sistem ini menolong pengguna untuk memberi

keselamatan kepada perkataan menggunakan gabungan penyulitan. Gabungan

penyulitan akan membuat perkataan akan menjadi lebih selamat kerana ia menggunakan

gabungan dua penyulitan. Sistem ini mempunyai 2 lapis penyulitan dan penyahsulitan.

Disamping itu, sistem ini juga memastikan hanya penerima sebenar akan menerima

perkataan daripada penghantar. Semasa gabungan Bluetooth, pengguna mesti menukar

kunci penghantaran.

Page 5: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

ix

TABLE OF CONTENT

CHAPTER TITLE PAGE

ACKNOWLEDGEMENT vi

ABSTRACT vii

TABLE OF CONTENTS ix-xi

LIST OF FIGURES xii-xiii

LIST OF TABLE xiii

LIST OF APPENDIX xiv

1 INTRODUCTION 1

1. 1 Introduction 1

1. 2 Problem Statement 2

1. 3 Objective 3

1. 4 Scope 3

1. 5 Thesis Organization 3

2 LITERATURE REVIEW 5

2.1 Introduction 5

2.2 The Concept of the Project 6

2.2.1 The Concept of Security 6

2.2.2 The Concept of File Transfer 8

2.2.3 The Concept of Bluetooth Technology 9

2.3 Basic Bluetooth Security 10

2.3.1 Authentication 10

2.3.2 Confidentiality 12

2.3.3 Authorization 12

2.4 Techniques 12

2.4.1 Hybrid Encryption 14

2.4.2 Type Of Algorithm 14

2.4.3 Programming Languages 22

Page 6: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

x

2.4.4 Type Of Application 25

2.5 Bluetooth Security Risk 27

2.6 Comparison Between Existing Application 29

3 METHODOLOGY 29

3.1 Software Development Life Cycle 31

3.1.1 Waterfall Model 32

3.1.1.1 Analysis And Definition 33

3.1.1.2 System And Software Design 34

3.1.1.2.1Interface Design 34

3.1.1.2.2Flowchart of The System 36

3.1.1.2.3 Use Case Diagram 38

3.1.1.2.4 Context Diagram 39

3.1.1.2.5 Level 0 Diagram 40

3.1.1.3 Implementation 41

3.1.1.4 System Testing 42

3.1.1.5 Operations and Maintenance 43

3.2 System Requirement 43

3.2.1 Software Requirement 44

3.2.2 Hardware Requirement 44

4 SYSTEM DEVELOPMENT AND TESTING 45

4.1 Connect Bluetooth Device 45

4.2 System Development 46

5 RESULTS AND DISCUSSION 58

5.1 Results 58

5.2 Discussion 59

5.2.1 Strength 59

5.2.2 Weakness 60

Page 7: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

xi

5.3 System Enhancement 60

6 CONCLUSION 62

REFERENCES 63

APPENDICES 65

Page 8: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

xii

LIST OF FIGURES

FIGURE NO. TITLE PAGE

2.0 File Transfer 9

2.1 Symbol Of Bluetooth 9

2.2 Bluetooth Security 10

2.3 Authentication Process 11

2.4 Blowfish Algorithm 15

2.5 Twofish 16

2.6 Basic Structure of AES Algorithm 18

2.7 Small Example Of Splay 21

3.1 Example of SDLC Waterfall 33

3.2 The Flow of project 34

3.3 Logical Interface for Login The System 35

3.4 Logical Interface at Sender sides 35

3.5 Logical Interface at Receiver sides 36

3.6 Flowchart of the system 37

3.7 Use Case Diagram for the system 38

3.8 Context Diagram of the system 39

3.9 Level 0 Diagram 40

3.10 Blowfish Algorithm 41

3.11 Twofish Algorithm 42

4.1 Select Device 45

4.2 Set key passkey 46

4.3 Enter pairing code 46

4.4 Success Interfaces 47

4.5 Login Interface 48

Page 9: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

xiii

FIGURE NO. TITLE PAGE

4.6 Login Interface with message box 48

4.7 Register interface 49

4.8 Register interface with message box success 50

4.9 Register interface with message box username and

password

50

4.10 Login interface with username and password 51

4.11 Encrypt & Decrypt interface with message box port can’t

empty

52

4.12 Encrypt & Decrypt interface with message box port close 53

4.13 Insert text to encrypt 53

4.14 Encrypt text 54

LIST OF TABLE

TABLE NO. TITLE PAGE

1 Module security level specification file transfer 7

2 Symmetric versus Asymmetric 13

3 Comparison between algorithm 21

4 Comparison between existing system 29

5 Comparison between existing application and Secure text

Transfer via Bluetooth sing Hybrid Encryption

30

6 Software requirement 43

7 Hardware Requirement 43

Page 10: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

xiv

LIST OF APPENDIXES

APPENDIX TITLE PAGE

1 Gantt Chart 64

2 User Manual 65

Page 11: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

1

CHAPTER 1

INTRODUCTION

1.1 Introduction

Bluetooth technology is a transmission specification for digital data exchange

between 2 or more devices over short range that uses radio waves for communication.

Wireless signals of Bluetooth usually cover up to 10 meters and it can communicate at

less than 1 Mbps. These technologies were use in large company such as Sony Ericsson,

Nokia, Motorola, and IBM. There are a few version of Bluetooth such as Bluetooth

version 1.2, Bluetooth version 2.0 and Bluetooth version 3.0. Bluetooth version 3.0 is

the best technology compare to the other version because it can transfer the data in high

speed rate.

The file can transfer using Bluetooth technology is include documents, image and

voice over the devices like PDAs, phones and laptop. Even though Bluetooth is slower in

transferring file compared to the other wireless technology but with this technology, it

will decrease the uses of wire and cable to transfer the file of data. Many people from a

different background like lecture, doctor, teachers and other professional use Bluetooth

technology to transfer the file of data.

The malicious hacker using Bluetooth connections to steal the phone book, photo

and calendar information or it allow the hacker to make the phone call or send an SMS

Page 12: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

2

using one‟s mobile. The billing records would certainly point directly to the owner of the

phone and real sender of the SMS. The security for the file transfer using Bluetooth

technology is not so efficient so that the file and the personal information have been

taken by the intruders. As a customer of Bluetooth technology, it is important for the

customer to secure the file when using Bluetooth technology as a medium to transfer the

file from one device to the other device. Secure the file when its transfer is important to

avoid the file hacked from a bad person. The hackers can break in, stealing, disrupting,

sabotage, modify and it will make the user of Bluetooth technology a problem when it

happens. Unfortunately, some user only knows how to transfer but don‟t know how to

secure it when it transfer. So, this project is carried out to produce an application to

Secure Text Transfer via Bluetooth Using Hybrid Encryption.

Hybrid Encryption is a method of encryption that combines two or more

encryption schemes and include a combination of symmetric and asymmetric encryption

to take the advantages of the strengths of each of the encryption. The two type of

encryption schemes use in this project is encryption algorithm and description algorithm.

Encryption algorithm is the algorithm to translate of data into a secret code and this is the

efficient way to achieve data security. Decryption is the process of decoding data that has

been encrypted into a secret format.

1.2 Problem Statement

One of the problem encountered leading to this project is because the text from

the user may be stealing or modify by the hackers for a some reason. So people who send

sensitive information over a wireless connection need to take precautions to make sure

the text are safe. The text will hack by the hackers if no security were uses. The default

Bluetooth system is not enough for preventing the intruder. It means the text security

must be enhance to make the text transferring using Bluetooth will be more secure and

power than before.

Page 13: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

3

1.3 Objectives

The objectives of the project are:

i. To ensure the true receivers only receive the text and access it.

ii. To increase the security of the text.

iii. To develop 2 layer of encryption and decryption.

1.4 Scopes

The scopes of the project are:

i. Using non-video and non-audio in file transferring.

ii. Using text only.

iii. Using Hybrid Encryption to make text transferring more secure.

iv. Using Bluetooth technology.

1.5 Thesis organization

This thesis consists of six chapters. First is chapter 1. It consist the whole idea of the

project that will be develop and it also include the objective of the project, problem

statement and the scopes of work.

In Chapter 2, it will explain about literature review of the project. The literature review

will be discussed about the algorithm and current technologies that will use during the

project.

Chapter 3 will be discussing the approach, method or technology that will use in the

project. Besides that, designing and implementation of the project also will be including

in Chapter 3.The information that will including in thesis are introduction on how the

project has been conduct, project methodology, methodology selection justification, and

software and hardware necessity.

Chapter 4 will explain about the designed of the project development and all the process

that was involved in development of the project. Besides that, in this chapter also contain

the explanation about the method involve in the development and how it develop.

Page 14: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

4

Chapter 5 is contain the result and data analysis that have been acquired and it also

included result analysis, project limitation, suggestion and project enhancement.

Chapter 6 will be discuss about conclusion of the development project and summarizing

about it.

Page 15: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

5

CHAPTER 2

LITERATURE REVIEW

This chapter discusses about the literature review of Secure Text Transfer via

Bluetooth Using Hybrid Encryption. There are several main sections in this chapter. The

first main section in this literature review is introduction. Then, the next main section is

describes about the concept of this project. After that, the basic of Bluetooth security will

be discussed in this main section. Next, there are two main sections will be discussed that

is techniques and Bluetooth security risk. The last main section discussed in this project

is the existing security and vulnerabilities in Bluetooth.

2.1 Introduction

The information about this literature review gets from journal, web page, article

and source relevant to this project. The aim for literature review is to get a clearer

information and perceptive in developing Secure Text Transfer via Bluetooth Using

Hybrid Encryption. So, this chapter will explain on all information needed for this

project. The firstly section in this literature review will descript the concept for this

project. The main concepts of this security are Secure Text Transfer via Bluetooth Using

Page 16: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

6

Hybrid Encryption. This section includes the definition of security, file transfer, and

Bluetooth technology.

Besides that, in this chapter also will be descript about the basic Bluetooth

security, techniques, Bluetooth security risk, and the existing security and vulnerabilities

in Bluetooth. The technique section explain the technique will use in this project, the type

of algorithm and the type of programming languages. In Bluetooth security risk section

explain the type of security risk in Bluetooth. This section explains detail about it. The

last sections discuss the existing security and vulnerabilities in Bluetooth. This section

shows the Bluetooth version and it vulnerabilities.

2.2 The Concept of the Project

There are several concepts that are needed to give clearly defined about this

project. The first concept is security. The next concept is file transfer and the last concept

is Bluetooth technology.

2.2.1 The Concept of Security

According to the web pages, security is the degree of protection against danger,

damage, loss, and crime. Security is important things for everyone whether student,

lecture or professional person. For company, the security is very important to secure the

important things. The Institute for Security and Open Methodologies (ISECOM) defines

that the security as a form of protection where a separation is created between the assets

and the threat. This includes but is not limited to the elimination of either the asset or the

threat. Security was defined as a national study in a United Nations study (1986), so any

countries can develop and progress safely.

Security can be compared related to the concepts of safety, continuity, and

reliability. The difference between security and reliability is that security must take into

account the actions of people attempting to cause destruction.

Page 17: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

7

Table 1 - Module Security Level Specification File Transfer

Security Requirements Section Level

Cryptographic Module Specification 2

Module Ports and Interfaces 2

Security Requirements Section Level

Roles, Services and Authentication 3

Finite State Model 2

Physical Security 2

Operational Environment N/A

Cryptographic Key Management 2

EMI/EMC 2

Self-Tests 2

Design Assurance 2

Mitigation of Other Attacks N/A

Page 18: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

8

Safety is freedom from any danger or from liability to any danger or harm, and

safeness. The quality of making safe or secure, or of giving confidence, justifying trust,

insuring against harm or loss.In simple word, the word reliable to mean that something is

dependable and that it will give the same outcome every time. The reliability is the ability

of an apparatus, machine, or system to consistently perform its intended or required

function or mission, on demand and without degradation or failure.

In Bluetooth security procedures, it includes of authorization, authentication and

optional encryption. Authentication is proving the identity of a computer or computer

user, or in Bluetooth case, proving the identity of one piconet member to another.

Authorization is the process of denying access to a network resource. Encryption is the

translation of data into secret code that can‟t be read by unauthorized person. It is used

between Bluetooth devices so that eavesdroppers cannot read its contents.

2.2.2 The Concept of File Transfer

File transfer is the movement of one or more file from one location to another

location.. An electronic stored file can be moved by physically moving the electronic

storage medium, such as a computer diskette, hard disk, or compact disk from one place

to another place or by sending the files over a telecommunications medium like

Bluetooth, wireless or infrared. On the Internet, the File Transfer Protocol (FTP) is use as

a common way to transfer a single file or a relatively small number of files from one

computer to another.

File Transfer Protocol (FTP) is a standard network protocol are used to transfer

files from one location to another location over a TCP based network, such as the

Internet. File Transfer Protocol is built on a client server architecture and utilizes separate

control and data connections between the client and server. FTP users may authenticate

themselves using a clear text sign in protocol but can connect anonymously if the server

is configured to allow it.

Page 19: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

9

Figure 2.0: File Transfer

2.2.3 The Concept of Bluetooth Technology

The name of Bluetooth is taken from the 10th century Danish King Harald

Blatand Harold Bluetooth in English. During the formative stage of the trade association

a code name was needed to name the effort. King Blatand was instrumental in uniting

warring factions in parts of what is now Norway, Sweden, and Denmark. The

Bluetoothtechnology is designed to allow communication between different devices like

computer - mobile phone and computer - camera[10].

Figure 2.1: Symbol Of Bluetooth

Bluetooth wireless technology is the most widely supported, versatile and it is the

secure wireless standard on the market today. Bluetooth works in the open 2.4 GHz ISM

band and now found in any products such as input devices, printers, medical devices,

Page 20: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

10

VoIP phones, white boards and surveillance cameras [10]. 20 years ago, the only

way to connect computer together for sharing information and resources is through cables

from one computer to other computer. This can be not only cumbersome to set up, but it

can get messy real quick. Bluetooth provide a solution to this problem by providing a

cable free environment. The cost to transfer a file also become less [3].

Bluetooth can form ad hoc networks of several devices, called piconets. When the

first Bluetooth connect, master that initiates the connection and the others are slaves

devices. One connection can have maximum seven actives devices and one slaves

devices. All communication within a piconetneeds goes through thepiconet master. When

two or more piconets together, they will become scatternet. It can be used to eliminate

Bluetooth range restrictions [10].

2.3 Basic Bluetooth Security

Figure 2.2: Bluetooth Security

In Bluetooth standard, there are 3 basic security services:

2.3.1 Authentication

Authentification is verify the identity of communicating devices like Bluetooth

and the user of authentication is not provided natively by Bluetooth Karen [13].

Page 21: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

11

Figure 2.3: Authentication Process

The steps in the authentication process are as follows:

Step 1. The verifier transmits a 128 bit random challenge (AU_RAND) to the

claimant.

Step 2. The claimant uses the E1algorithm9 to compute an authentication response

using his unique 48 bit Bluetooth device address (BD_ADDR), the link key, and

AU_RAND as inputs. The verifier performs the same computation. Only the 32 most

significant bits of the E1output are used for authentication purposes. The remaining

96 bits of the 128 bit output are known as the Authenticated Ciphering Offset (ACO)

value, which will be used later to create the Bluetooth encryption key.

Step 3. The claimant returns the most significant 32 bits of the E1output as the

computed response, SRES, to the verifier.

Step 4. The verifier compares the SRES from the claimant with the value that it

computed.

Step 5. If the two 32 bit values are equal, the authentication is considered successful.

If the two 32 bit values are not equal, the authentication has failed.

Page 22: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

12

2.3.2 Confidentiality

Confidentiality is preventing information access by unauthorized user caused of

eavesdropping by ensure that only authorized devices can access and view the data [13].

Bluetooth technology has three Encryption Modes, but only two of them actually provide

confidentiality. The modes are as follows:

Encryption Mode 1-No encryption is performed on any traffic.

Encryption Mode 2-Individually addressed traffic is encrypted using encryption

keys based on individual link keys, broadcast traffic is not encrypted

Encryption Mode 3-All traffic is encrypted using an encryption key based on the

master link key.

2.3.3 Authorization

The last basic security service is authorization. Authorization is allowing the

control of resources by ensuring that device is authorized to use services before the it

transfer a file[13].

2.4 Techniques

The concept of securing messages through cryptography has a long history. Julius

Caesar was created one of the earliest cryptographic systems to send military messages to

his generals [11]. The cryptography is the art of protecting information by changing it

into an unreadable text, called cipher text. Only the person who has a secret keycan

decrypt the message into readable text. Encrypted messages can be broken by

cryptanalysis, also called code breaking, although modern cryptography techniques are

virtually unbreakable.

Cryptography is used to protect e-mail messages, credit card information,

corporate data and other things. Encryption systems used what is known as symmetric

cryptography. Symmetric cryptography uses the same key to encryption and decryption

the text.Using symmetric cryptography, it is safe to send encrypted messages without any

Page 23: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

13

fear of interruption by unauthorized user. A major advance in cryptography occurred with

the invention of public-key cryptography. The primary feature of public-key

cryptography is that it removes the need to use the same key for encryption and

decryption. With public-key cryptography, keys come in pairs of matched “public” and

“private” keys. The public portion of the key pair can be distributed in a public manner

without compromising the private portion, which must be kept secret by its owner.

Table 2 : Symmetric versus Asymmetric

Characteristic

Symmetric

Asymmetric

Key used for encryption /

decryption

Same key is used

One key used for encryption

and another different key is

used for decryption

Speed of encryption /

decryption

Very fast

Slower

Size of resulting encrypted

text

Usually same as or less than

the original clear text size

More than original clear text

size

Key agreement / exchange

A big problem

No problem at all

Number of keys required as

compared to the number of

participants in the message

exchange

Equals about the square of

the number of participants,

so scalability is an issue

Same as the number of

participants, so scales up

quite well.

Page 24: SECURE TEXT TRANSFER VIA BLUETOOTH USING HYBRID …umpir.ump.edu.my/id/eprint/7020/1/Secure_text... · Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure

14

2.4.1 Hybrid Encryption

In this project use the hybrid encryption method. Hybrid encryption is a method

of encryption that combines two or more encryption schemes and include a combination

of symmetric and asymmetric encryption to take the advantages of the strengths of each

of the encryption. Encryption algorithm is the algorithm to translate of data into a secret

code that can‟t read by unauthorized userand this is the efficient way to achieve data

security. Decryption is the process of decoding data that has been encrypted into a format

that can be read [2].

An encryption system in which the sender and receiver shared a onekey that will

used to encrypt and decrypt the message. Contrast this with public-key cryptology, which

utilizes two keys a public key to encrypt messages and a private key to decrypt the

message. Symmetric key systems are simpler and faster, but their main drawback is that

the two parties must somehow exchange the key in a secure way. Public-key encryption

avoids this problem because the public key can be distributed in a non-secure way, and

the private key is never transmitted. Symmetric key cryptography is sometimes called

secret key cryptography. The most popular symmetric key system is the Data Encryption

Standard (DES) [2].

2.4.2 Type Of Algorithm

Blowfish

Blowfish is a symmetric block cipher that can be used for encryption and secure

the data. The blowfish keyis 32 bits to 448 bits and that make it ideal for securing data.

Blowfish was designed in year 1993 by Bruce Schneider as a fast, free alternative to

existing encryption algorithm. Blowfish is unpatented and the license is free for all users.

The example Blowfish algorithm is a Feistel Network, iterating a simple encryption 16

times.

The block size of Blowfish algorithm is 64 bits and key can be any length up to

448 bits [12]. Although there is a complex initialization phase required before any

encryption can take place, the actual encryption of text is very efficient on large