Sie sind auf Seite 1von 14

Software Requirement Specification

On

ComEn-A mobile device compression and encryption

Table of Contents
Page no

1. INTRODUCTION

1.1 Purpose:
The main objective of this document is to illustrate the requirements of the project, ComEn:A mobile device compression and encryption approach. The document gives the detailed description of the both functional and non functional requirements proposed by the client. It also describes the design constraints that are to be considered when the system is to be designed, and other factors necessary to provide a complete and comprehensive description of the requirements for the software. The Software Requirements Specification (SRS) captures the complete software requirements for the system, or a portion of the system .The document is developed after the consultations with the client and considering the complete requirement specifications of the given Project. The final product of the team will be meeting the requirements of this document.

1.2 Scope:
The Software Requirements Specification captures all the requirements in a single document. Any changes made to the requirements in future will have to undergo a formal change approval process. This project is basically updating the current system of short message service(SMS) into an application in which the message is encrypted aswellas compressed so that to make the system more flexible, cost effective and secure.

1.3 Overview
This Software Requirement Specification (SRS) is the requirements work product that formally specifies ComEn. The objective of this document is to formally describe the systems high level requirements including functional requirements, non-functional requirements and constraints. The detailed structure of this document is organized as follows:

Section 2 gives an overall description of the software. It gives what level of proficiency is expected of the user, some general constraints while making the software and some assumptions and dependencies that are assumed. Section 3 gives specific requirements which the software is expected to deliver. This document also gives information about software interface and functional requirements of the system. Section 4 deals with non functional requirements which include design constraints of the system.

1.4 Reference:
Gobi.R,

Sathya.P,

Dr.E.George

Dharma

Prakash

Raj,

Sasikumar.T, ComEn- A Mobile Device Compression and Encryption 2010.


Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed

Approach,

Proceedings of the International

Conference on Communication and Computational Intelligence

& Ahmed M Mahfouz , Hybrid Compression Encryption Technique for Securing SMS, International Journal of Computer Science and Security (IJCSS).
J. Orlin Grabbe ,DES algorithm illustrated,

http://www.aci.net/kalliste/des.htm.
www.wikipedia.com, DES algorithm.

2. OVERALL DESCRIPTION
3

2.1 Product perspective:


The proposed ComEn which is being developed is an J2ME application. The system aimed towards the different fields which uses messaging through mobiles such as mobile payment, recharge and mobile commerce. Although SMS was originally meant to notify users of their voicemail messages, it has now become a popular means of communication by individuals and businesses. Banks worldwide are using SMS to conduct some of their banking services. For example, clients are able to query their bank balances via SMS or conduct mobile payments. Also, people sometimes exchange confidential information such as passwords or sensitive data amongst each other. Our approach to this problem in this paper is to propose a method that can be used to compress and to encrypt SMS messages that are about to be sent. In our approach, the physical underlying GSM architecture remains unchanged.

2.2 Product functions:


The main function of the product is to provide cost effective delivery of messages through mobiles.

Also it is ensured that to provide enough security and privacy for those messages.

For this we propose algorithms for compressing and encrypting the messages.

Before sending the messages it is compressed to a permissible limit so that to make it cost effective using compression algorithm and then it is encrypted using the DES encryption algorithm and then it is send via using the existing networks.

At the receiver side the cipher text is decrypted and decompressed to get the original message.
4

2.4 Dataflow diagram:


LEVEL 0:
User: admin/HOD/coordinator/guide/student

LEVEL 1:

2.4 User classes and characteristics:


The SMS makes it possible to send and receive short text messages to and from mobile phones. SMS was originally designed as part of Global System for Mobile Communication (GSM), but now it is available on a wide range of networks standards. SMS became a popular communication tools by individuals and business. SMS are used in day-to-day applications like banking, mobile payment, recharge and mobile commerce. The users are assumed to have basic knowledge of the mobiles and its services. The proper user interface, users manual, help and the guide to install and maintain the application must be sufficient to educate the users on how to use the system without any problems.

2.5 General constraints:

The users can access the application whenever they needed to

compress and encrypt data. The message should be delivered correctly to the valid users and it should get decrypted and decompressed.
Since SMS follows store and forward procedure the message

should be delivered correctly whenever the network is available.

The

physical

underlying

GSM

architecture

remains

unchanged. The encrypted and compressed messages are sent along the existing channel.

3. EXTERNAL REQUIREMENT SPECIFICATION: 3.1 Software and Hardware interfaces:

Hardware Requirements

CPU HARD DISK SPACE DISPLAY MAIN MEMORY Software Requirements LANGUAGE OPERATING SYSTEM MOBILE PLATFORM OR ABOVE

PENTIUM III PROCESSOR OR ABOVE 40 GB 15 COLOR MONITOR 256 MB

JAVA/J2ME WINDOWS 7/XP CLDC 1.1 AND MIDP 2.0

3.2 functional requirements:


8

It illustrates organizing the functional requirements for the product by system features, the major services provided by the product. As specified in the section 2.2 product functions it provides some services. ComEn is a mobile application which is to be developed in J2ME. Main functionality is to compress the SMS into a permissible limit and then to provide security to the messages send, by encrypting them. Certain functions are needed to be performed by the the application at both sending side and receiving side.

In this approach, the physical underlying GSM architecture remains unchanged. At the sending side, the plain text is get compressed using the compression scheme, The methods include human interpretive compression or so-called word or phrase abbreviation, in which the compressed messages are manually keyed-in by the senders.

In order to save the cost, many SMS senders tend to type as much information as possible within the limit of 160 characters per SMS by using various abbreviations. The abbreviations utilized in the message are popularly used and interpreted by the senders and receivers. This can be implemented using lookup tables and symbol tables.

And then this compressed message is encrypted using the DES algorithm for providing security. The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It is based on a symmetric-key algorithm that uses a 56-bit key.

Then it is send through the channel, A Mobile Switching Center (MSC) automatically coordinates and controls call setup and routing between mobile phones in a given service area. MSCs
9

are connected to base stations by T1 landlines or microwave channels, and by landlines to the Public Service Telephone Network (PSTN). The SMS is store and forward service, and is not sent directly but delivered via an SMS Center (SMSC). SMSC is a network element in the mobile telephone network, in which SMS is stored until the destination device becomes available. SMSC guarantees delivery of text message by the network.

Messages are stored in the network until the destination cell phone becomes available, so users can receive or transmit an SMS message at any time, whether voice call is in progress or not. SMSCs communicate with TCP/IP networks via a Gateway Mobile Switching Center (GMSC).

At the receiver side the cipher text is decrypted by using the private key and then it is decompressed to the original message. The private/public key technique is ideal for establishing the foundation for a secure communications path, since messages encrypted with the public key cannot be decrypted without the private key. Hence, the public key can be distributed without risk.

DES algorithm, the figure below gives an over view of encryption process,

10

The Data Encryption Standard (DES) specifies two FIPS approved cryptographic algorithms as required by FIPS 140-1. When used in conjunction with American National Standards Institute (ANSI) X9.52 standard, this publication provides a complete description of the mathematical algorithms for encrypting (enciphering) and decrypting (deciphering) binary coded information. Encrypting data converts it to an unintelligible form called cipher. Decrypting cipher converts the data back to its original form called plaintext. The algorithms described in this standard specifies both enciphering and deciphering operations which are based on a binary number called a key. A DES key consists of 64 binary digits ("0"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, may be used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte1.
11

The algorithm is designed to encipher and decipher blocks of data consisting of 64 bits under control of a 64-bit key1. Deciphering must be accomplished by using the same key as for enciphering, but with the schedule of addressing the key bits altered so that the deciphering process is the reverse of the enciphering process. A block to be enciphered is subjected to an initial permutation IP, then to a complex keydependent computation and finally to a permutation which is the inverse of the initial permutation IP-1. The key-dependent computation can be simply defined in terms of a function f, called the cipher function, and a function KS, called the key schedule. A description of the computation is given first, along with details as to how the algorithm is used for encipherment. Next, the use of the algorithm for decipherment is described. Finally, a definition of the cipher function f is given in terms of primitive functions which are called the selection functions Si and the permutation function P.

Compression Scheme
Although SMS messaging has brought tremendous conveniences to everyone nowadays, there are still many problems hidden beneath this service. One of the main problems is the maximum number of characters for a single normal SMS is only 160 characters. Due to this limitation, many other problems have been arisen,such as: it would not be cost-effective if around 170 characters are sent. That is because the message will be sent as 2 SMSs (160 char. + 10 char.). if slightly more than 160 characters were typed in a message, most of the users would try to pack the message into one SMS by looking back the message and delete the not important words or change the words into abbreviation as many as possible. It would be a troublesome and timeconsuming work. in order to save money by packing more information as much as possible

12

into one SMS, many types of abbreviations has been used. The uncontrolled use of abbreviations in messaging has created a lot of strange messages which are hardly understood by the receiver without earlier synchronizing with the sender. The average compression efficiency of the message must be more than 40 percent. The efficiency is obtained by calculating the ratio of total characters in a compressed SMS to the total characters of the original SMS. Our approach to this problem is to develop an application for SMS Compression. Several mobile device manufacturers have adopted Java as their platform offered for mobile application developers. To certain extent Java applications are portable between devices of different vendors. With this application, the users can reduce significantly the number of single messages required for sending a long message. When the user has a long message to send, the application can be used to compress it and by sending the compressed message, shorter than the original, it will reduce the cost. For the application development, the mobile application using Java ME language is developed. The methods include human interpretive compression or so-called word or phrase abbreviation, in which the compressed messages are manually keyed-in by the senders. In order to save the cost, many SMS senders tend to type as much information as possible within the limit of 160 characters per SMS by using various abbreviations. The abbreviations utilized in the message are popularly used and interpreted by the senders and receivers. This can be implemented using lookup tables and symbol tables. The application designed can be used by Java ME Mobile Information Device Profile (MIDP) 2.0 enabled phones.

4. NON-FUNCTIONAL REQUIREMENTS 4.1. Performance Requirements:


13

The proposed system that we are going to develop will be used as an application in java/j2me which can be used in mobile phones to send and receive messages which are compressed and encrypted using the application and it is needed to ensure that it would perform functionally well as per all the requirements that are specified by the system.

4.2. Safety Requirements:


Since here we are using the key based encryption the keys are needed to provide to the valid users to get the original messages and also network and the database is to be maintained consistent to send and deliver the messages.

14

Das könnte Ihnen auch gefallen