Abstract
With the increasing popularity of Android mobile terminals, the data stored in mobile terminals has become the object of attack by attackers. How to carry out effective privacy protection becomes an important issue that we need to consider. Among all privacy protection methods, it is a good strategy to encrypt data using encryption algorithms. This paper mainly studies the SM4 symmetric encryption algorithm proposed by the China National Cryptography Authority. In order to solve the crackability of the SM4 encryption algorithm, a mixed congruence method is used to generate a pseudo-random sequence, and the encrypted content is grouped and rearranged to improve its anti-cracking capability. The improved SM4 encryption algorithm is used to protect the data. Not only does the improved algorithm improve the security of the original algorithm, but also meets the need for encryption speed on Android mobile terminals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jiayan, W., Kaiyong, X., Leyu, D.: An android malicious application detection method based on privilege features. Comput. Appl. Softw. (2018)
Chun, B.G.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Acm Trans. Comput. Syst. 32(2), 1–29 (2014)
Li, S., et al.: Real-time monitoring of privacy abuses and intrusion detection in android system. In: International Conference on Human Aspects of Information Security. Springer-Verlag, New York, Inc. (2015)
Lei, L., et al.: VirusMeter: preventing your cellphone from spies. In: International Symposium on Recent Advances in Intrusion Detection (2009)
Reshetova, E., Bonazzi, F., Asokan, N.: SELint: an SEAndroid policy analysis tool. (2017)
Shunhe, L.: Analysis and research of the encryption method for SQLite. Comput. Appl. Softw. (2008)
Laia, Y., et al.: File Cryptography with AES and RSA for Mobile Based on Android (2018)
Yang, A., et al.: Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols. Sci. World J. (2014-9-2)Â 2014(2014), 825984 (2014)
Lai, J.Y., Huang, C.T.: A highly efficient cipher processor for dual-field elliptic curve cryptography. IEEE Trans. Circuits Syst. II Express Briefs 56(5), 394–398 (2009)
Bai, D., et al.: Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. Inf. Secur. Iet 9(3), 167–178 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhao, J., Bao, Q., Ni, Y. (2020). Improved SM4 Encryption Algorithm Based on Mixed Congruence Method. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-22263-5_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22262-8
Online ISBN: 978-3-030-22263-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)