Research Article
BibTex RIS Cite

An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices

Year 2017, Volume: 6 Issue: 1, 1 - 10, 15.02.2017

Abstract

Mobile devices,
especially smart phones are widely used today. Users may benefit from the
important services like banking, shopping and messaging, through these devices
in mobile environments.  This widespread
use requires the adoption of various measures to ensure the security of
personal information. In this study, a mobile application that allows mobile
messaging environment to the people communicating via encrypted messaging was
developed. In the application, Multi Fragmented Caesar Encryption algorithm was
used. The application was developed for Android devices. This application ensures
the information security while two users can message each other securely
through a shared encryption key.

References

  • Akleylek, S., Yıldırım, H. M., Tok, Z. Y., 2011. Cryptology and Its Applications: Public Key Infrastructure and Certified Electronic Mail. Akademik Bilişim, İnönü University, Malatya, 713-718.
  • Altuğ, M., 2012. An Encrypted Messaging Application for Mobile Phones with Polybius Algorithm. (Master Thesis), Gazi University, Bilişim Enstitüsü, Department of Electronic and Computer Systems Education, Ankara.
  • Anonymous, 2014a. Telegram. https://telegram.org Access Date: 23.06.2015
  • Anonymous, 2014b. TextSecure Private Messenger. https://play.google.com/store/apps/details?id=org.thoughtcrime. securesms&hl=tr Access Date: 02.06.2015
  • Anonymous, 2015a. Android Studio IDE. https://developer.android.com/sdk/index.html Access Date: 21.05.2015
  • Anonymous, 2015b. Kriptoloji, http://tr.wikipedia.org/wiki/Kriptoloji Access Date: 10.06.2015
  • Anonymous, 2015c. Java Official Web Site. https://www.java.com/tr/ Access Date: 21.05.2015
  • Anonymous, 2015d. SQLite Android Bindings Documentation.https://www.sqlite.org/android/doc/trunk/www/index.wiki Access Date: 21.05.2015
  • Anonymous, 2015e. Tübitak Bilgem Ulusal Bilgi Güvenliği Kapısı. "BGYS- 0001 Bilgi Güvenliği Yönetim Sistemi Kurulum Kılavuzu". http://www.bilgiguvenligi.gov.tr/bilgi-guvenligi-yonetimi-dokumanlari/uekae-bgys-0001-bilgi-guvenligi-yonetim-sistemi-kurulum-kilavuzu.html Access Date: 12.06.2015
  • Aydoğan Y., 2014. Multi Fragmented Caesar Cipher Method and Its Applications. (Master Thesis), Gaziosmanpaşa Üniversity, Institute of Sciences, Department of Mathematics, Tokat.
  • Canbek, G., Sağıroğlu, Ş., 2006. A Review on Information, Information Security and Security Processes. Journal of Polytechnic, 9(3), 165-174.
  • Canbek, G., Sağıroğlu, Ş., 2007. Attacks Against Computer Systems and Their Types: A Review Study. Erciyes University Journal Of Institue of Science, 23(1-2), 1-12.
  • Coşkun, A., Ülker, Ü., 2013. Development of A Cryptographic Algorithm for National Information Security and Determination of Confidence Against Letter Frequency Analysis. International Journal of Informatics Technologies, 6(2), 31-39.
  • Çinar, M.S., Çinar, I., Bilge, H.Ş., 2013. Secure Email Application Using an Original Encryption Algorithm. 6th International Information Security & Cryptology Conference, pp. 332-337, 2013.
  • Güven, B., 2013. Development of Cryptographic Document Management Systems Devoted to Non- Documentation of Work Procedures for Universities. (Master Thesis), Karabük Üniversity, Institute of Sciences, Department of Computer Engineering, Karabük.
  • Nabiyev, V., 2010. Yapay Zekâ. 3. baskı, Ankara.
  • Jones, A., 2005. Information Warfare-what has been happening? Computer Fraud&Security.
  • Okumuş, İ., 2012. The Factors Affecting Speed of the RSA Cryptosystem. (PhD Thesis), Atatürk University, Institute of Sciences, Department of Mathematics, Erzurum.
  • Sağıroğlu, Ş., Alkan, M., 2005. Bilgi Güvenliği Bilimi (Kriptoloji), Her Yönüyle Elektronik İmza. Grafiker Yayınları, Ankara, 21-50.
  • Soyalıç, S., 2005. Cryptographic Hash Functions and Its Applications. (Master Thesis), Erciyes Üniversity, Institute of Sciences, Department of Mathematics, Kayseri.
  • Yılmaz, R., 2010. Some Statistical Tests for Cryptographic Applications. (Master Thesis), Selçuk University, Institute of Sciences, Department of Statistics, Konya.
  • Yılmaz, T., 2004. The Solutions of Security Problems for Smart Cards. (Master Thesis), Selçuk University, Institute of Sciences, Department of Computer Systems Education, Konya.
Year 2017, Volume: 6 Issue: 1, 1 - 10, 15.02.2017

Abstract

References

  • Akleylek, S., Yıldırım, H. M., Tok, Z. Y., 2011. Cryptology and Its Applications: Public Key Infrastructure and Certified Electronic Mail. Akademik Bilişim, İnönü University, Malatya, 713-718.
  • Altuğ, M., 2012. An Encrypted Messaging Application for Mobile Phones with Polybius Algorithm. (Master Thesis), Gazi University, Bilişim Enstitüsü, Department of Electronic and Computer Systems Education, Ankara.
  • Anonymous, 2014a. Telegram. https://telegram.org Access Date: 23.06.2015
  • Anonymous, 2014b. TextSecure Private Messenger. https://play.google.com/store/apps/details?id=org.thoughtcrime. securesms&hl=tr Access Date: 02.06.2015
  • Anonymous, 2015a. Android Studio IDE. https://developer.android.com/sdk/index.html Access Date: 21.05.2015
  • Anonymous, 2015b. Kriptoloji, http://tr.wikipedia.org/wiki/Kriptoloji Access Date: 10.06.2015
  • Anonymous, 2015c. Java Official Web Site. https://www.java.com/tr/ Access Date: 21.05.2015
  • Anonymous, 2015d. SQLite Android Bindings Documentation.https://www.sqlite.org/android/doc/trunk/www/index.wiki Access Date: 21.05.2015
  • Anonymous, 2015e. Tübitak Bilgem Ulusal Bilgi Güvenliği Kapısı. "BGYS- 0001 Bilgi Güvenliği Yönetim Sistemi Kurulum Kılavuzu". http://www.bilgiguvenligi.gov.tr/bilgi-guvenligi-yonetimi-dokumanlari/uekae-bgys-0001-bilgi-guvenligi-yonetim-sistemi-kurulum-kilavuzu.html Access Date: 12.06.2015
  • Aydoğan Y., 2014. Multi Fragmented Caesar Cipher Method and Its Applications. (Master Thesis), Gaziosmanpaşa Üniversity, Institute of Sciences, Department of Mathematics, Tokat.
  • Canbek, G., Sağıroğlu, Ş., 2006. A Review on Information, Information Security and Security Processes. Journal of Polytechnic, 9(3), 165-174.
  • Canbek, G., Sağıroğlu, Ş., 2007. Attacks Against Computer Systems and Their Types: A Review Study. Erciyes University Journal Of Institue of Science, 23(1-2), 1-12.
  • Coşkun, A., Ülker, Ü., 2013. Development of A Cryptographic Algorithm for National Information Security and Determination of Confidence Against Letter Frequency Analysis. International Journal of Informatics Technologies, 6(2), 31-39.
  • Çinar, M.S., Çinar, I., Bilge, H.Ş., 2013. Secure Email Application Using an Original Encryption Algorithm. 6th International Information Security & Cryptology Conference, pp. 332-337, 2013.
  • Güven, B., 2013. Development of Cryptographic Document Management Systems Devoted to Non- Documentation of Work Procedures for Universities. (Master Thesis), Karabük Üniversity, Institute of Sciences, Department of Computer Engineering, Karabük.
  • Nabiyev, V., 2010. Yapay Zekâ. 3. baskı, Ankara.
  • Jones, A., 2005. Information Warfare-what has been happening? Computer Fraud&Security.
  • Okumuş, İ., 2012. The Factors Affecting Speed of the RSA Cryptosystem. (PhD Thesis), Atatürk University, Institute of Sciences, Department of Mathematics, Erzurum.
  • Sağıroğlu, Ş., Alkan, M., 2005. Bilgi Güvenliği Bilimi (Kriptoloji), Her Yönüyle Elektronik İmza. Grafiker Yayınları, Ankara, 21-50.
  • Soyalıç, S., 2005. Cryptographic Hash Functions and Its Applications. (Master Thesis), Erciyes Üniversity, Institute of Sciences, Department of Mathematics, Kayseri.
  • Yılmaz, R., 2010. Some Statistical Tests for Cryptographic Applications. (Master Thesis), Selçuk University, Institute of Sciences, Department of Statistics, Konya.
  • Yılmaz, T., 2004. The Solutions of Security Problems for Smart Cards. (Master Thesis), Selçuk University, Institute of Sciences, Department of Computer Systems Education, Konya.
There are 22 citations in total.

Details

Journal Section Articles
Authors

Levent Gokrem

Omer Faruk Nasıp This is me

Publication Date February 15, 2017
Published in Issue Year 2017 Volume: 6 Issue: 1

Cite

APA Gokrem, L., & Nasıp, O. F. (2017). An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices. Journal of New Results in Science, 6(1), 1-10.
AMA Gokrem L, Nasıp OF. An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices. JNRS. April 2017;6(1):1-10.
Chicago Gokrem, Levent, and Omer Faruk Nasıp. “An Encrypted Messaging Application With Multi Fragmented Caesar Encryption Method Between Mobile Devices”. Journal of New Results in Science 6, no. 1 (April 2017): 1-10.
EndNote Gokrem L, Nasıp OF (April 1, 2017) An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices. Journal of New Results in Science 6 1 1–10.
IEEE L. Gokrem and O. F. Nasıp, “An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices”, JNRS, vol. 6, no. 1, pp. 1–10, 2017.
ISNAD Gokrem, Levent - Nasıp, Omer Faruk. “An Encrypted Messaging Application With Multi Fragmented Caesar Encryption Method Between Mobile Devices”. Journal of New Results in Science 6/1 (April 2017), 1-10.
JAMA Gokrem L, Nasıp OF. An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices. JNRS. 2017;6:1–10.
MLA Gokrem, Levent and Omer Faruk Nasıp. “An Encrypted Messaging Application With Multi Fragmented Caesar Encryption Method Between Mobile Devices”. Journal of New Results in Science, vol. 6, no. 1, 2017, pp. 1-10.
Vancouver Gokrem L, Nasıp OF. An Encrypted Messaging Application with Multi Fragmented Caesar Encryption Method between Mobile Devices. JNRS. 2017;6(1):1-10.


TR Dizin 31688

EBSCO30456


Electronic Journals Library EZB   30356

 DOAJ   30355                                             

WorldCat  30357                                             303573035530355

Academindex   30358

SOBİAD   30359

Scilit   30360


29388 As of 2021, JNRS is licensed under a Creative Commons Attribution-NonCommercial 4.0 International Licence (CC BY-NC).