Font Size: a A A

Software Realization Of GSM Encrypt Mobile Based On Arrange Yards Encrypt Aloorithm

Posted on:2008-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:S T LiuFull Text:PDF
GTID:2178360245978356Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
With the development of GSM technology, cell phone has become a necessity of people's everyday life to exchange information. While cell phone is used as a convenient channel to communicate thoughts, convey secrete feelings, discuss business, pay costs, or even transmit important information related to national economy, diplomacy and military affairs, it is also an easy way for others to hack in. Therefore, to research and implement cell phone terminal incorporating information security is an urgent issue. This dissertation aims to implement such a GSM terminal with encryption function.The content of this thesis includes aspects as follows:1. A study of information security technology. Basic information security knowledge, such as cryptology's current development, basic concepts, threats we face and solutions proposed, etc is introduced. At last, the core algorithm of this thesis, permutation code encryption and decryption, is specifically addressed.2. System architecture of cell phone terminal. Architecture of GSM communication protocols and the software system architecture of cell phone terminal are detailed.3. Comprehensive elaboration of the design and implementation of encryption software for cell phone. According to user's requirements, the task of this thesis is divided into five modules: anti-harass, anti-telltale, anti-lost, data encryption and speech encryption. Anti-harass is to design incoming call firewall and text message firewall for cell phone. Usually, all types of cell phones have special tools to read contents of cell phone storage devices. In this case, all the data in cell phone risks being stolen by others, and this function is to provide users more advanced protection; speech encryption equips cell phone with real time encryption for speech.
Keywords/Search Tags:encryption, gsm, cell phone, permutation code
PDF Full Text Request
Related items