ANDROID SECURITY MECHANISM AND ENCRYPTION SERVICE - Code Shoppy
Best Android PHP Project Center Kumbakonam - Code Shoppy
ANDROID SECURITY MECHANISM AND ENCRYPTION
SERVICE
A. Security model
Android uses a layered system architecture, which consists of the Linux kernel layer, the hardware abstraction layer,
the system runtime library layer, the application framework
layer and the application layer [4]. Figure 1 shows the
architecture of Android.
Android is based on the Linux operating system kernel,
which implements the core functions of hardware device
driver, process and memory management, network protocol
stack, power management and so on. In addition, Android
also increased the number of mobile devices for specific
functions, such as Low Memory Killer, Ashmem (Anonymous Shared Memory), and Binder. https://codeshoppy.com/project-center-kumbakonam.html These enhancements
to help further the Androids memory management, inter
process communication (IPC) and other aspects of security.
Android mechanism also uses the security features provided by the Linux kernel, using Linux user isolation mechanism to achieve Android application sandbox mechanism.
During the installation phase of the application, Android
automatically provide for each application with unique UID
(User ID), application execution on the specific process
in the UID operation, in addition, each application has
a special data read and write permissions for their own
directory. So the application sandbox mechanism ensures
that each application runs in its own independent space, the
mutual interference between each other, thus greatly enhance
the protection of user privacy, and stability and running
application security [5].
Because the Android application sandbox mechanism
makes a process can access the memory of another process
space, so as to achieve inter process communication, Binder as a new IPC mechanism for Android came into being.
Binder is based on the design and conception of OpenBinder,
and realizes the distributed component architecture based
on abstract interface. The Binder mechanism in the kernel
space to increase the process identifier, thus, the caller can
not exceed the allowed permission system to obtain through
forged identity, so it can prevent the occurrence of right
phenomenon, improve safety.
B. Encryption Service
The encryption service of the Android system can protect
the system security based on the Java encryption architecture
[5]. Supported encryption algorithms includes: DES algorithm, AES algorithm, DH algorithm, RSA algorithm, MD5
algorithm, SHA-1, SHA-256, etc..
DES (Data Encryption Standard) is one of the most
popular block cipher which also widely used in the world
[6]. It is developed by the United States IBM company,
it is the length of the plaintext packet of 64 bits, the key
length of 56 bits.
To express in three stages, the first is
the initial replacement, then has the same function in the
16 round of transformation, and finally after an inverse
initial permutation; where was the key point, first through
a replacement function, then the encryption process of each
round, produce a sub key through a circular left shift and
replacement. The decryption algorithm of DES is the same
as what the encryption algorithm, while the sub key is used
in reverse order [7].
AES (Advanced Encryption Standard)is a block encryption standard adopted by the federal government[8].
Issued by the National Institute of standards and Technology
(NIST) that has become one of the most popular algorithms
for symmetric key encryption [9]. AES algorithm is a block
cipher with block length and key length. The key length
and the block length may be independently designated as
128 bits, 192 bits, and 256 bits. AES algorithm is the
most basic transformation unit ”round” multiple iterations.
The round function is composed of four different internal
functions: ByteSubShiftRowMixColumnAddRoundKey.
The
decryption of the algorithm is only in the opposite direction
inversion encryption [7].
DH (Diffie-Hellman) key exchange protocol is the
first public key cryptosystem proposed by W.Diffie and
M.Hellman in 1976 [10]. The purpose of the algorithm
is to enable two users to exchange keys safely, and to
obtain a shared session key. The security of the algorithm
based on the difficulty of finding discrete logarithms. The
RSA algorithm was constructed by R.Rivst, A.Shamir, and
L.Adleman in 1978 [11]. It is also the most mature and
perfect public key cryptosystem.
Comments
Post a Comment