SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Android And iOS Encryption Systems
BY GROUP 4: Riya Chauhan(141060753016)
Birju Tank((141060753017)
Naman Vaishnav((141060753018)
Dhara Patel((141060753019)
Okasha Mahi((141060753020)
DATE:17/04/2015
IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 )
At: GTU PG SCHOOL,GANDHINAGAR
Contents
• What is Encryption?-Introduction
• Encryption and Different Mobile Devices
• Android Encryption Systems
• iOS Encryption Systems
• Android vs. iOS Encryption
• Latest Implementation for Encryption in
Different Devices
• Advantages and Disadvantages
• Conclusion
• References
What is Encryption?-Introduction
• Security and privacy are hot topic this days, with government snooping, big
company data leaks, and hacking on rise.
• One important step you can take to protect your information is to encrypt it.
This is especially true for devices that tend to get lost or stolen such as
your cell phone.
• For many people that's worth it to keep personal information truly private
and secured. Also, mobile professionals working in certain industries--
finance and healthcare,
• For example--encryption isn't optional. All devices that store or access
consumers' personally identifiable information have to be secured or else
you're not in compliance with the law
Encryption and Different Mobile
Devices
• First, you might be wondering why you should even bother with encrypting your
mobile device, especially if you don’t store much or any personal information on it.
And if you already have a lock Screen with pass code (or other unlock
measure),isn’t that good enough?
• The answer is encryption does more than just bar a person from accessing
information on your cell phone, as the lock screen does.
• Encrypting your data takes it a step further. It makes the information unreadable--
in deep, useless--even if somehow a hacker got through the lock screen.
• Example: You can think of the lock screen as a lock on a door Without the key,
uninvited guests can't come in and steal all your belongings (Using the door
analogy, even if a thief comes in through the window, encryption is like creating a
mirage so all the things in your home look like they're in a super uncrackable safe.)
Cont..
Apple iOS
• The iOS denies access under all circumstances to many of the device’s
sensitive subsystems. Thus increasing the security of iOS based devices
since it removes the user from security decision-making process.
Android
• The Android permission system relies on the user to make all policy
decisions and decide whether an apps requested combination of permission
is safe or not.
Blackberry (BB10):
• introduces us to Blackberry Balance. Balance allows organizations to
create isolation between personal and work environments on a device
When Balance is enabled, workspace is automatically encrypted, leaving
personal environment unencrypted.
Windows Phone 8:
• WP8 uses the Unified Extensible Firmware Interface for secure boot,
ensuring devices do not load rooted or unauthorized system images.
• WP8 apps run in isolated “chambers”, which are similar to sandbox. The
data between the applications is shared in the cloud and not on the device.
Android Encryption Systems
Fig: Overview of the Android dm-crypt
based encryption system. The whole file
system is encrypted and the required file-
system master key is protected by a key
derived from the user’s passcode.
Before Start encrypting set your PIN
• Types of Android Encryption System
1. File-System Encryption – Dm-crypt
2. Android Key Chain
3. Backup
Encrypt Your Android Smartphone or
Tablet
Step:1 Tap Here
Step:2Click on Encrypt
Phone
Step:3 You’ll see a progress indicator
appear with Warning
Cont..
Your Device is encrypting now
iOS Encryption Systems
• Encrypt Your iPhone or iPad Data
• Step One: Set up a passcode to lock your device under Settings > General >
Passcode Lock.The PIN or passcode not only creates a lockscreen, it also
encrypts the iPhone data or iPad data.
• Not all of it, however. The only things that are encrypted in this dead-easy
method are your iMessages, mail messages and attachments, and data from
some apps that have data encryption.
• OS X and iOS provide a number of encryption technologies. Of these, three
APIs are available on both iOS and OS X:
1. Keychain Services API—provides secure storage for passwords, keys, and
so on
2. Cryptographic Message Syntax—provides (nonstreaming) symmetric and
asymmetric encryption and decryption
3. Certificate, Key, and Trust Services—provides cryptographic support
services and trust validation
Cont..
1. Set your pass code
Set “ON”Encrypt
3. Encrypted Server
Android vs. iOS Encryption
Apple iOS
• The iOS uses a hardware accelerated AES-256 encryption to encrypt all data stored
in the flash memory of the device.
• The iOS protects specific additional data items, such as email using an additional
layer of encryption.
• Within 10 seconds of the device locking, the decryption keys for files in device are
discarded.
Android
• The primary encryption system on Android is a file-system based
encryption system based on dm-crypt
• Android recently began offering built in encryption in 3.0, earlier versions of
android contain no encryption capability, instead to rely on islolation and
permissions to safeguard data.
• A simple jailbreak of an android phone, or theft of device’s SD card can lead to
significant loss of data.
• In this comparison always apple wins because it has tight security and much more.
Latest Implementation for Encryption
in Different Devices
• Apple ready to unveil its next generation of iPads, also Google has
unwrapped Android 5.0 and accompanying phones and tablets.
• Like the iOS 8 that Apple delivered in September, Google’s latest
iteration of Android — also dubbed L or Lollipop — brings a new
level of information security via automatic encryption.
• What default encryption will do: Mandatory encryption will
provide additional assurances for healthcare organizations
concerned about the data on Apple iPhones and iPads and the
various smartphones and slates that run Google’s Android, Marco
said.
Advantages and Disadvantages
Advantage
• Your device and your personal data are safe.
• No one can hack your personal information.
Disadvantages
• If your Encryption process is interrupted then
your data will be lost.
• In case , If you forget Passcode or PIN or
Password then you have to format it.
Conclusion
• To facilitate this task, I have systematically
analyzed and assessed different encryption
systems for Android and iOS platform, which
provide the opportunity to protect security
critical and confidential data. In contrast to
other mobile platforms such as iOS,
BlackBerry, or Windows Phone,Android
features many more different but iOS is the
best.
References
1. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner, “iOS Encryption Systems:
Deploying iOS Devices in Security-Critical Environments,” in Proceedings of the 10th
International Conference on Security and Cryptography – SECRYPT 2013, Reykjavik, 2013
2. P. Teufl , Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas
Zefferer, “ Android Encryption Systems”
[Online].Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6122788
3. Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei “A SDKEY-based Secure Storage and
Transmission Approach for Android Phone” in International Conference on Cyber-Enabled
Distributed Computing and Knowledge Discovery , 2014.
4. Zhaohui Wang ; Murmuria, R. ; Stavrou, A. Implementing and Optimizing an Encryption
Filesystem on Android[C], 2012 IEEE 13th International Conference on Mobile Data
Management (MDM), 2012 ,Page(s): 52 – 62.
5. Chen, Y. C. Y. and Ku, W.-S. K. W.-S. (2009). Self-Encryption Scheme for Data Security in
Mobile Devices.
Thanking You!
Any Questions???

Weitere ähnliche Inhalte

Was ist angesagt?

The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataMichael Smith
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)dwipalp
 
Ios operating system
Ios operating systemIos operating system
Ios operating systemTIB Academy
 
iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions Sandra Kerbage
 
Apple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemApple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemDhruv Patel
 
I phone programming project report
I phone programming project reportI phone programming project report
I phone programming project reportDhara Shah
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and EncryptionUrvashi Kataria
 
Srinumanne ios operating system ppt
Srinumanne ios operating system pptSrinumanne ios operating system ppt
Srinumanne ios operating system pptSrinu Manne
 

Was ist angesagt? (20)

Apple's ios
Apple's iosApple's ios
Apple's ios
 
iOS I phone operating system
iOS I phone operating system iOS I phone operating system
iOS I phone operating system
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
iOS Operating System
iOS Operating SystemiOS Operating System
iOS Operating System
 
Android & IOS
Android & IOSAndroid & IOS
Android & IOS
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android Data
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)
 
Ios operating system
Ios operating systemIos operating system
Ios operating system
 
Apple ios
Apple iosApple ios
Apple ios
 
iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
Apple iOS
Apple iOSApple iOS
Apple iOS
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Apple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemApple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating system
 
I phone programming project report
I phone programming project reportI phone programming project report
I phone programming project report
 
iOS - History of iOS
iOS - History of iOSiOS - History of iOS
iOS - History of iOS
 
iOS Security and Encryption
iOS Security and EncryptioniOS Security and Encryption
iOS Security and Encryption
 
Srinumanne ios operating system ppt
Srinumanne ios operating system pptSrinumanne ios operating system ppt
Srinumanne ios operating system ppt
 

Andere mochten auch

prop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBprop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBAPNIC
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
flashcache原理及改造
flashcache原理及改造flashcache原理及改造
flashcache原理及改造Hao(Robin) Dong
 
Device mapper multipathing
Device mapper multipathingDevice mapper multipathing
Device mapper multipathingAnand Loganathan
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
Comparison and contrast essays aug152013
Comparison and contrast essays aug152013Comparison and contrast essays aug152013
Comparison and contrast essays aug152013Aj Muu
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devicesDroidcon Berlin
 

Andere mochten auch (8)

prop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBprop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DB
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
flashcache原理及改造
flashcache原理及改造flashcache原理及改造
flashcache原理及改造
 
Device mapper multipathing
Device mapper multipathingDevice mapper multipathing
Device mapper multipathing
 
Steganography
SteganographySteganography
Steganography
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Comparison and contrast essays aug152013
Comparison and contrast essays aug152013Comparison and contrast essays aug152013
Comparison and contrast essays aug152013
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 

Ähnlich wie Android vs iOS encryption systems

Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Nagarro
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)Lacoon Mobile Security
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?Reality Net System Solutions
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 

Ähnlich wie Android vs iOS encryption systems (20)

Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 

Mehr von Birju Tank

Database security
Database securityDatabase security
Database securityBirju Tank
 
Vulnerabilities in Android
Vulnerabilities in AndroidVulnerabilities in Android
Vulnerabilities in AndroidBirju Tank
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
5 g technology
5 g technology5 g technology
5 g technologyBirju Tank
 
Literature review report
Literature review reportLiterature review report
Literature review reportBirju Tank
 
Secure routing in DSR
Secure routing in DSRSecure routing in DSR
Secure routing in DSRBirju Tank
 
J2ME Mobile app
J2ME Mobile appJ2ME Mobile app
J2ME Mobile appBirju Tank
 
Software prototyping
Software prototypingSoftware prototyping
Software prototypingBirju Tank
 
Secure lab setup for cyber security
Secure lab setup for cyber securitySecure lab setup for cyber security
Secure lab setup for cyber securityBirju Tank
 
Android operating system
Android operating systemAndroid operating system
Android operating systemBirju Tank
 
Virtualization
VirtualizationVirtualization
VirtualizationBirju Tank
 
Mobile Broadband Wireless Access
Mobile Broadband Wireless AccessMobile Broadband Wireless Access
Mobile Broadband Wireless AccessBirju Tank
 
Process management
Process managementProcess management
Process managementBirju Tank
 

Mehr von Birju Tank (14)

Database security
Database securityDatabase security
Database security
 
Vulnerabilities in Android
Vulnerabilities in AndroidVulnerabilities in Android
Vulnerabilities in Android
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
5 g technology
5 g technology5 g technology
5 g technology
 
Literature review report
Literature review reportLiterature review report
Literature review report
 
Secure routing in DSR
Secure routing in DSRSecure routing in DSR
Secure routing in DSR
 
J2ME Mobile app
J2ME Mobile appJ2ME Mobile app
J2ME Mobile app
 
Software prototyping
Software prototypingSoftware prototyping
Software prototyping
 
Secure lab setup for cyber security
Secure lab setup for cyber securitySecure lab setup for cyber security
Secure lab setup for cyber security
 
Data mining
Data miningData mining
Data mining
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Mobile Broadband Wireless Access
Mobile Broadband Wireless AccessMobile Broadband Wireless Access
Mobile Broadband Wireless Access
 
Process management
Process managementProcess management
Process management
 

Kürzlich hochgeladen

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Kürzlich hochgeladen (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Android vs iOS encryption systems

  • 1. Android And iOS Encryption Systems BY GROUP 4: Riya Chauhan(141060753016) Birju Tank((141060753017) Naman Vaishnav((141060753018) Dhara Patel((141060753019) Okasha Mahi((141060753020) DATE:17/04/2015 IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 ) At: GTU PG SCHOOL,GANDHINAGAR
  • 2. Contents • What is Encryption?-Introduction • Encryption and Different Mobile Devices • Android Encryption Systems • iOS Encryption Systems • Android vs. iOS Encryption • Latest Implementation for Encryption in Different Devices • Advantages and Disadvantages • Conclusion • References
  • 3. What is Encryption?-Introduction • Security and privacy are hot topic this days, with government snooping, big company data leaks, and hacking on rise. • One important step you can take to protect your information is to encrypt it. This is especially true for devices that tend to get lost or stolen such as your cell phone. • For many people that's worth it to keep personal information truly private and secured. Also, mobile professionals working in certain industries-- finance and healthcare, • For example--encryption isn't optional. All devices that store or access consumers' personally identifiable information have to be secured or else you're not in compliance with the law
  • 4. Encryption and Different Mobile Devices • First, you might be wondering why you should even bother with encrypting your mobile device, especially if you don’t store much or any personal information on it. And if you already have a lock Screen with pass code (or other unlock measure),isn’t that good enough? • The answer is encryption does more than just bar a person from accessing information on your cell phone, as the lock screen does. • Encrypting your data takes it a step further. It makes the information unreadable-- in deep, useless--even if somehow a hacker got through the lock screen. • Example: You can think of the lock screen as a lock on a door Without the key, uninvited guests can't come in and steal all your belongings (Using the door analogy, even if a thief comes in through the window, encryption is like creating a mirage so all the things in your home look like they're in a super uncrackable safe.)
  • 5. Cont.. Apple iOS • The iOS denies access under all circumstances to many of the device’s sensitive subsystems. Thus increasing the security of iOS based devices since it removes the user from security decision-making process. Android • The Android permission system relies on the user to make all policy decisions and decide whether an apps requested combination of permission is safe or not. Blackberry (BB10): • introduces us to Blackberry Balance. Balance allows organizations to create isolation between personal and work environments on a device When Balance is enabled, workspace is automatically encrypted, leaving personal environment unencrypted. Windows Phone 8: • WP8 uses the Unified Extensible Firmware Interface for secure boot, ensuring devices do not load rooted or unauthorized system images. • WP8 apps run in isolated “chambers”, which are similar to sandbox. The data between the applications is shared in the cloud and not on the device.
  • 6. Android Encryption Systems Fig: Overview of the Android dm-crypt based encryption system. The whole file system is encrypted and the required file- system master key is protected by a key derived from the user’s passcode. Before Start encrypting set your PIN • Types of Android Encryption System 1. File-System Encryption – Dm-crypt 2. Android Key Chain 3. Backup
  • 7. Encrypt Your Android Smartphone or Tablet Step:1 Tap Here Step:2Click on Encrypt Phone Step:3 You’ll see a progress indicator appear with Warning
  • 8. Cont.. Your Device is encrypting now
  • 9. iOS Encryption Systems • Encrypt Your iPhone or iPad Data • Step One: Set up a passcode to lock your device under Settings > General > Passcode Lock.The PIN or passcode not only creates a lockscreen, it also encrypts the iPhone data or iPad data. • Not all of it, however. The only things that are encrypted in this dead-easy method are your iMessages, mail messages and attachments, and data from some apps that have data encryption. • OS X and iOS provide a number of encryption technologies. Of these, three APIs are available on both iOS and OS X: 1. Keychain Services API—provides secure storage for passwords, keys, and so on 2. Cryptographic Message Syntax—provides (nonstreaming) symmetric and asymmetric encryption and decryption 3. Certificate, Key, and Trust Services—provides cryptographic support services and trust validation
  • 10. Cont.. 1. Set your pass code Set “ON”Encrypt 3. Encrypted Server
  • 11. Android vs. iOS Encryption Apple iOS • The iOS uses a hardware accelerated AES-256 encryption to encrypt all data stored in the flash memory of the device. • The iOS protects specific additional data items, such as email using an additional layer of encryption. • Within 10 seconds of the device locking, the decryption keys for files in device are discarded. Android • The primary encryption system on Android is a file-system based encryption system based on dm-crypt • Android recently began offering built in encryption in 3.0, earlier versions of android contain no encryption capability, instead to rely on islolation and permissions to safeguard data. • A simple jailbreak of an android phone, or theft of device’s SD card can lead to significant loss of data. • In this comparison always apple wins because it has tight security and much more.
  • 12. Latest Implementation for Encryption in Different Devices • Apple ready to unveil its next generation of iPads, also Google has unwrapped Android 5.0 and accompanying phones and tablets. • Like the iOS 8 that Apple delivered in September, Google’s latest iteration of Android — also dubbed L or Lollipop — brings a new level of information security via automatic encryption. • What default encryption will do: Mandatory encryption will provide additional assurances for healthcare organizations concerned about the data on Apple iPhones and iPads and the various smartphones and slates that run Google’s Android, Marco said.
  • 13. Advantages and Disadvantages Advantage • Your device and your personal data are safe. • No one can hack your personal information. Disadvantages • If your Encryption process is interrupted then your data will be lost. • In case , If you forget Passcode or PIN or Password then you have to format it.
  • 14. Conclusion • To facilitate this task, I have systematically analyzed and assessed different encryption systems for Android and iOS platform, which provide the opportunity to protect security critical and confidential data. In contrast to other mobile platforms such as iOS, BlackBerry, or Windows Phone,Android features many more different but iOS is the best.
  • 15. References 1. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner, “iOS Encryption Systems: Deploying iOS Devices in Security-Critical Environments,” in Proceedings of the 10th International Conference on Security and Cryptography – SECRYPT 2013, Reykjavik, 2013 2. P. Teufl , Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer, “ Android Encryption Systems” [Online].Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6122788 3. Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei “A SDKEY-based Secure Storage and Transmission Approach for Android Phone” in International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery , 2014. 4. Zhaohui Wang ; Murmuria, R. ; Stavrou, A. Implementing and Optimizing an Encryption Filesystem on Android[C], 2012 IEEE 13th International Conference on Mobile Data Management (MDM), 2012 ,Page(s): 52 – 62. 5. Chen, Y. C. Y. and Ku, W.-S. K. W.-S. (2009). Self-Encryption Scheme for Data Security in Mobile Devices.