Innovative Methodologies for Mobile Security and Cryptography
Abstract
As mobile phones are evolving; security problems are increasing. On one side, attackers are constantly trying to crack all encryption algorithms and security procedures followed to access the users’ data, and on the other side, providers are continuously trying to respond to those attacks. This article discusses the algorithms used to encrypt the data on mobile phones, the weaknesses they have, the attacks they encountered, and the enhancements done on them.