Android Application for Encrypted Memo
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 137 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Memo is a very common feature in all kind of cellular phones, be it a high-end smartphone or a very basic feature phone. The task of a memo is to help the users to make a note of their day to day tasks and their personal and sensitive information. The real goal of this application is to secure the sensitive data and avoid others from accessing them. These memos are generally saved in the local memory of the specific devices and are prone to all kinds of security threats when those files are accessed from other sources than the memo application itself. The real goal of this application is to safeguard all the private information of the users and keep them in an encrypted form (Hill Cipher). This application uses substitution algorithms to encrypt the user data as soon as the user saves the memo. The user will be prompted to use a different every time they intend to encrypt their data and the user will have to enter the same to decrypt them as well, and if the user does not enter any key then the encryption phase is skipped altogether. Since the is only known to the user any wrong will yield the wrong decrypted message that will provide wrong information to the infiltrator. Since everyone tends to carry a smartphone with them it is most likely by them that they hastily store their private information in the insecure memo applications leaving them vulnerable to various kinds of threats. Only the person with the correct s will be able to decipher the encrypted memos and access their secure information.

Keywords: Encrypt, Symmetric Algorithm, Key Cipher, Hill Cipher

Edition: Volume 7 Issue 4, April 2018

Pages: 35 - 39

Share this Article

How to Cite this Article?

S. Jaya Kumar, Ahitagnee Paul, "Android Application for Encrypted Memo", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20181156, Volume 7 Issue 4, April 2018, 35 - 39

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Encrypt'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 90 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Similar Articles with Keyword 'Symmetric Algorithm'

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2810 - 2816

Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures

T. Balamurugan, T. Hemalatha

Share this Article

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1886 - 1889

Deduplication Using SHA-1 and IBE with Modified AES

Renuka C. Deshpande, S. S. Ponde

Share this Article

Downloads: 137 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Similar Articles with Keyword 'Key Cipher'

Downloads: 109 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Downloads: 115 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 859 - 862

Searching Keyword Using Public-Key Ciphertexts with Hidden Structures

K. Maheshwari, S. Nithya

Share this Article

Downloads: 126 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 279 - 283

A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES

B. Parsharamulu, R. V. Krishnaiah

Share this Article

Downloads: 137 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Similar Articles with Keyword 'Hill Cipher'

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 7, July 2016

Pages: 1149 - 1152

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan

Share this Article

Downloads: 120 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this Article

Downloads: 137 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Downloads: 152 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 11, November 2015

Pages: 607 - 612

Classical Image Encryption and Decryption

Noor Dhia Kadhm Al-Shakarchy, Hiba Jabbar Al- Eqabie, Huda Fawzi Al- Shahad

Share this Article



Top