Presentation Title

Android Secure Text Encryption

Presenter Information

Jeffrey s. Putnam jrFollow

Presentation Type

Poster

School

School of Sciences and Social Sciences

Discipline

Computer Science

Mentor

Michael Hanrahan, Wei Lu

Date & Time

April 9th at 4:15 PM - 5:30 PM

Location

L. P. Young Student Center, West Dining and Flag Room

Abstract

It has been well known that our online text messages are not safe anymore from prying eyes since the Edward Snowden revelations. With it in mind, the proposed project aims to build a better solution for us to shield our communications from prying eyes when texting. One way to protect ourselves is to use end-to-end encryption. The end-to-end encryption requires that a text message is randomized before it is sent from a smart phone to another smartphone and deciphered after it is received, therefore anyone listening in between the two smartphones cannot understand what the text message says. The proposed end-to-end encryption approach will include two separate mathematical formulas as well as their mathematically related numeric keys. One of these formulas has a public key associated with its user, this will be used to safely transport the keys for the second more efficient formula, which is used for continuous communication.

Share

COinS
 
Apr 9th, 4:15 PM

Android Secure Text Encryption

L. P. Young Student Center, West Dining and Flag Room

It has been well known that our online text messages are not safe anymore from prying eyes since the Edward Snowden revelations. With it in mind, the proposed project aims to build a better solution for us to shield our communications from prying eyes when texting. One way to protect ourselves is to use end-to-end encryption. The end-to-end encryption requires that a text message is randomized before it is sent from a smart phone to another smartphone and deciphered after it is received, therefore anyone listening in between the two smartphones cannot understand what the text message says. The proposed end-to-end encryption approach will include two separate mathematical formulas as well as their mathematically related numeric keys. One of these formulas has a public key associated with its user, this will be used to safely transport the keys for the second more efficient formula, which is used for continuous communication.