SlideShare une entreprise Scribd logo
1  sur  11
Objective
To propose an android application which uses Rabbit Algorithm to develop Email Client
Application.
Implementation of Rabbit algorithm in email application to secure email content on Android
smart phone. This particular email client uses Rabbit algorithm to encrypt and decrypt
confidential email’s content.
This application can be used to create, edit, send, retrieve, and read a simple email. Email
client is built for Android smart phone by using Java. The experiments prove that by using
Google Mail service this application can be used as simple email client with secured content
feature.
Problem Statement
Email is method to exchange message by using internet connection. Email as one of
many important communication facilities sometimes contains confidential content that
needs to be secured. One of many methods to ensure contents secrecy is by using
encryption. The proposed algorithm is Rabbit which is a symmetric algorithm and
symmetric algorithm is faster than asymmetric ones. Email service nowadays is
commonly accessed by using smart phone. One of the most popular smart phone
operating system is Android. In order to maintain secrecy of email sent from Android
smart phone, encryption and decryption process must be planted in an email client for
Android smart phone.
Project ScopeProject Scope
 Email service nowadays is commonly accessed by using smart phone. One of the
most popular smart phone operating system is Android. In order to maintain secrecy of
email sent from Android smart phone, encryption and decryption process must be
planted in an email client for Android smart phone.
 This application can be used to create, edit, send, retrieve, and read a simple email.
Email client is built for Android smart phone by using Java. The experiments prove that
by using Google Mail service this application can be used as simple email client with
secured content feature.
Literature Survey
 Rabbit algorithm was created by Fast Software Encryption in 2003 with Martin
Boesgaard, Mette Vesterager, Jesper Christiansen, and Ove Scavenius.
 There are three schemes of Rabbit:
(1) Key setup scheme,
(2) Next state function scheme, and
(3) Extraction scheme.
 Key setup scheme is used for initiating value of variables. Next state function is used
for updating variables value. Extraction scheme is used to create a 128 bit
pseudorandom string. Cipher text is created by using XOR operation between 128 bit
plaintext with 128 bit pseudorandom string.
Literature Survey Continued..
 Android is developed by Google which is currently running in smart phones. Android
was built on Linux platform and developed by using Java. Android has already been
optimized in order to be used in mobile environment. Android is nowadays known as
a popular smart phone operating system.
• Minimum Software Requirement
 Technology:- Java JDK and Android SDK
 Tools:- NET bean and eclipse
 Database:- MySQL
 OS:- Windows XP
Minimum Hardware Requirement
 Hard disk:- 80 GB
 RAM:- 512MB
 PROCESSOR:- Intel Pentium4
 Heart Rate Checker
 Android Mobile
System ArchitectureSystem Architecture
[1] BOESGAARD. MARTIN, PEDERSEN. THOMAS, VESTERAGER. METTE, “THE RABBIT
STREAM CIPHER – DESIGN AND SECURITY ANALYSIS”.
[2] BRYAN. RANDY, “TOP 4 ADVANTAGES OF ANDROID OVER THE IPHONE”. 2010
[ONLINE]. AVAILABLE: HTTP://RANDYBRYAN.COM/?P=671. [ACCESSED 7 NOVEMBER
2011].
[3] CRISPIN. M, “INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4REV1”.
[4] KETUWARE, “SYMMECTIC VS. ASYMMECTIC ENCRYPTION”.
[5] PARTIGE. CRAIG, "THE TECHNICAL DEVELOPMENT OF INTERNET EMAIL”.
[6] POSTEL. J.B, “SIMPLE MAIN TRANSFER PROTOCOL”.
[7] TITLOW. J.P, “ANDROID, THE FASTEST GROWING SMARTPHONE OS IN EUROPE,
ZOOMS PAST IPHONE”. 2011. [ONLINE].
AVAILABLE:
HTTP://WWW.READWRITEWEB.COM/ARCHIVES/ANDROID_EUROPEAN_MARKETSHARE_
BEATS_IPHONE.PHP. [ACCESSED 3 NOVEMBER 2011].
[8] TURNER. DAVID, “INTRODUCING ANDROID 1.5 NDK”. 2009. [ONLINE]. AVAILABLE:
HTTP://ANDROID-DEVELOPERS.BLOGSPOT.COM/2009/06/INTRODUCINGANDROID-15-
NDK-RELEASE-1.HTML. [AVAILABLE 6 DECEMBER 2011].
References
Email client application with rabbit algorithm for android

Contenu connexe

Dernier

Dernier (20)

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Email client application with rabbit algorithm for android

  • 1.
  • 2. Objective To propose an android application which uses Rabbit Algorithm to develop Email Client Application. Implementation of Rabbit algorithm in email application to secure email content on Android smart phone. This particular email client uses Rabbit algorithm to encrypt and decrypt confidential email’s content. This application can be used to create, edit, send, retrieve, and read a simple email. Email client is built for Android smart phone by using Java. The experiments prove that by using Google Mail service this application can be used as simple email client with secured content feature.
  • 3. Problem Statement Email is method to exchange message by using internet connection. Email as one of many important communication facilities sometimes contains confidential content that needs to be secured. One of many methods to ensure contents secrecy is by using encryption. The proposed algorithm is Rabbit which is a symmetric algorithm and symmetric algorithm is faster than asymmetric ones. Email service nowadays is commonly accessed by using smart phone. One of the most popular smart phone operating system is Android. In order to maintain secrecy of email sent from Android smart phone, encryption and decryption process must be planted in an email client for Android smart phone.
  • 4. Project ScopeProject Scope  Email service nowadays is commonly accessed by using smart phone. One of the most popular smart phone operating system is Android. In order to maintain secrecy of email sent from Android smart phone, encryption and decryption process must be planted in an email client for Android smart phone.  This application can be used to create, edit, send, retrieve, and read a simple email. Email client is built for Android smart phone by using Java. The experiments prove that by using Google Mail service this application can be used as simple email client with secured content feature.
  • 5. Literature Survey  Rabbit algorithm was created by Fast Software Encryption in 2003 with Martin Boesgaard, Mette Vesterager, Jesper Christiansen, and Ove Scavenius.  There are three schemes of Rabbit: (1) Key setup scheme, (2) Next state function scheme, and (3) Extraction scheme.  Key setup scheme is used for initiating value of variables. Next state function is used for updating variables value. Extraction scheme is used to create a 128 bit pseudorandom string. Cipher text is created by using XOR operation between 128 bit plaintext with 128 bit pseudorandom string.
  • 6. Literature Survey Continued..  Android is developed by Google which is currently running in smart phones. Android was built on Linux platform and developed by using Java. Android has already been optimized in order to be used in mobile environment. Android is nowadays known as a popular smart phone operating system.
  • 7. • Minimum Software Requirement  Technology:- Java JDK and Android SDK  Tools:- NET bean and eclipse  Database:- MySQL  OS:- Windows XP
  • 8. Minimum Hardware Requirement  Hard disk:- 80 GB  RAM:- 512MB  PROCESSOR:- Intel Pentium4  Heart Rate Checker  Android Mobile
  • 10. [1] BOESGAARD. MARTIN, PEDERSEN. THOMAS, VESTERAGER. METTE, “THE RABBIT STREAM CIPHER – DESIGN AND SECURITY ANALYSIS”. [2] BRYAN. RANDY, “TOP 4 ADVANTAGES OF ANDROID OVER THE IPHONE”. 2010 [ONLINE]. AVAILABLE: HTTP://RANDYBRYAN.COM/?P=671. [ACCESSED 7 NOVEMBER 2011]. [3] CRISPIN. M, “INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4REV1”. [4] KETUWARE, “SYMMECTIC VS. ASYMMECTIC ENCRYPTION”. [5] PARTIGE. CRAIG, "THE TECHNICAL DEVELOPMENT OF INTERNET EMAIL”. [6] POSTEL. J.B, “SIMPLE MAIN TRANSFER PROTOCOL”. [7] TITLOW. J.P, “ANDROID, THE FASTEST GROWING SMARTPHONE OS IN EUROPE, ZOOMS PAST IPHONE”. 2011. [ONLINE]. AVAILABLE: HTTP://WWW.READWRITEWEB.COM/ARCHIVES/ANDROID_EUROPEAN_MARKETSHARE_ BEATS_IPHONE.PHP. [ACCESSED 3 NOVEMBER 2011]. [8] TURNER. DAVID, “INTRODUCING ANDROID 1.5 NDK”. 2009. [ONLINE]. AVAILABLE: HTTP://ANDROID-DEVELOPERS.BLOGSPOT.COM/2009/06/INTRODUCINGANDROID-15- NDK-RELEASE-1.HTML. [AVAILABLE 6 DECEMBER 2011]. References