Mobility

An Innovative Approach to File Security Using Bluetooth

Download Now Free registration required

Executive Summary

In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. In order to keep this symmetric key secret the proposed system encrypts this confidential symmetric key with the public cryptographic function. This system also uses the Bluetooth technology as the main technique to personalize communication between elements of the system and key keeper. The use of Bluetooth device's MAC address which is stored in the registry of their personal computer plays a major role in securing the data.

  • Format: PDF
  • Size: 694.7 KB