首页 | 本学科首页   官方微博 | 高级检索  
     


End-to-end security implementation for mobile devices using TLS protocol
Authors:Baris Kayayurt  Tugkan Tuglular
Affiliation:(1) Havelsan, Eskisehir Yolu 7. Km., 06520 Ankara, Turkey;(2) Department of Computer Engineering, Izmir Institute of Technology, Gulbahce Koyu, Urla, Izmir, Turkey
Abstract:End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号