Downloads: 137 | Views: 414
Research Paper | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018 | Popularity: 6.4 / 10
Android Application for Encrypted Memo
S. Jaya Kumar, Ahitagnee Paul
Abstract: Memo is a very common feature in all kind of cellular phones, be it a high-end smartphone or a very basic feature phone. The task of a memo is to help the users to make a note of their day to day tasks and their personal and sensitive information. The real goal of this application is to secure the sensitive data and avoid others from accessing them. These memos are generally saved in the local memory of the specific devices and are prone to all kinds of security threats when those files are accessed from other sources than the memo application itself. The real goal of this application is to safeguard all the private information of the users and keep them in an encrypted form (Hill Cipher). This application uses substitution algorithms to encrypt the user data as soon as the user saves the memo. The user will be prompted to use a different every time they intend to encrypt their data and the user will have to enter the same to decrypt them as well, and if the user does not enter any key then the encryption phase is skipped altogether. Since the is only known to the user any wrong will yield the wrong decrypted message that will provide wrong information to the infiltrator. Since everyone tends to carry a smartphone with them it is most likely by them that they hastily store their private information in the insecure memo applications leaving them vulnerable to various kinds of threats. Only the person with the correct s will be able to decipher the encrypted memos and access their secure information.
Keywords: Encrypt, Symmetric Algorithm, Key Cipher, Hill Cipher
Edition: Volume 7 Issue 4, April 2018
Pages: 35 - 39
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N