+ All Categories
Home > Engineering > Android vs iOS encryption systems

Android vs iOS encryption systems

Date post: 16-Jul-2015
Category:
Upload: birju-tank
View: 136 times
Download: 3 times
Share this document with a friend
Popular Tags:
16
Android And iOS Encryption Systems BY GROUP 4: Riya Chauhan(141060753016) Birju Tank((141060753017) Naman Vaishnav((141060753018) Dhara Patel((141060753019) Okasha Mahi((141060753020) DATE:17/04/2015 IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 ) At: GTU PG SCHOOL,GANDHINAGAR
Transcript
Page 1: Android vs iOS encryption systems

Android And iOS Encryption Systems

BY GROUP 4: Riya Chauhan(141060753016)Birju Tank((141060753017)

Naman Vaishnav((141060753018)Dhara Patel((141060753019)

Okasha Mahi((141060753020)DATE:17/04/2015

IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 )

At: GTU PG SCHOOL,GANDHINAGAR

Page 2: Android vs iOS encryption systems

Contents

• What is Encryption?-Introduction

• Encryption and Different Mobile Devices

• Android Encryption Systems

• iOS Encryption Systems

• Android vs. iOS Encryption

• Latest Implementation for Encryption in Different Devices

• Advantages and Disadvantages

• Conclusion

• References

Page 3: Android vs iOS encryption systems

What is Encryption?-Introduction

• Security and privacy are hot topic this days, with government snooping, bigcompany data leaks, and hacking on rise.

• One important step you can take to protect your information is to encrypt it.This is especially true for devices that tend to get lost or stolen such asyour cell phone.

• For many people that's worth it to keep personal information truly privateand secured. Also, mobile professionals working in certain industries--finance and healthcare,

• For example--encryption isn't optional. All devices that store or accessconsumers' personally identifiable information have to be secured or elseyou're not in compliance with the law

Page 4: Android vs iOS encryption systems

Encryption and Different Mobile Devices

• First, you might be wondering why you should even bother with encrypting yourmobile device, especially if you don’t store much or any personal information on it.And if you already have a lock Screen with pass code (or other unlockmeasure),isn’t that good enough?

• The answer is encryption does more than just bar a person from accessinginformation on your cell phone, as the lock screen does.

• Encrypting your data takes it a step further. It makes the information unreadable--in deep, useless--even if somehow a hacker got through the lock screen.

• Example: You can think of the lock screen as a lock on a door Without the key,uninvited guests can't come in and steal all your belongings (Using the dooranalogy, even if a thief comes in through the window, encryption is like creating amirage so all the things in your home look like they're in a super uncrackable safe.)

Page 5: Android vs iOS encryption systems

Cont..Apple iOS• The iOS denies access under all circumstances to many of the device’s

sensitive subsystems. Thus increasing the security of iOS based devicessince it removes the user from security decision-making process.

Android

• The Android permission system relies on the user to make all policydecisions and decide whether an apps requested combination of permissionis safe or not.

Blackberry (BB10):• introduces us to Blackberry Balance. Balance allows organizations to

create isolation between personal and work environments on a deviceWhen Balance is enabled, workspace is automatically encrypted, leavingpersonal environment unencrypted.

Windows Phone 8:• WP8 uses the Unified Extensible Firmware Interface for secure boot,

ensuring devices do not load rooted or unauthorized system images.

• WP8 apps run in isolated “chambers”, which are similar to sandbox. Thedata between the applications is shared in the cloud and not on the device.

Page 6: Android vs iOS encryption systems

Android Encryption Systems

Fig: Overview of the Android dm-crypt

based encryption system. The whole file

system is encrypted and the required file-

system master key is protected by a key

derived from the user’s passcode.

Before Start encrypting set your PIN

• Types of Android Encryption System1. File-System Encryption – Dm-crypt2. Android Key Chain3. Backup

Page 7: Android vs iOS encryption systems

Encrypt Your Android Smartphone or Tablet

Step:1 Tap Here

Step:2Click on Encrypt Phone

Step:3 You’ll see a progress indicator appear with Warning

Page 8: Android vs iOS encryption systems

Cont..

Your Device is encrypting now

Page 9: Android vs iOS encryption systems

iOS Encryption Systems

• Encrypt Your iPhone or iPad Data

• Step One: Set up a passcode to lock your device under Settings > General >Passcode Lock.The PIN or passcode not only creates a lockscreen, it alsoencrypts the iPhone data or iPad data.

• Not all of it, however. The only things that are encrypted in this dead-easymethod are your iMessages, mail messages and attachments, and data fromsome apps that have data encryption.

• OS X and iOS provide a number of encryption technologies. Of these, three APIs are available on both iOS and OS X:

1. Keychain Services API—provides secure storage for passwords, keys, and so on

2. Cryptographic Message Syntax—provides (nonstreaming) symmetric and asymmetric encryption and decryption

3. Certificate, Key, and Trust Services—provides cryptographic support services and trust validation

Page 10: Android vs iOS encryption systems

Cont..

1. Set your pass code

Set “ON”Encrypt

3. Encrypted Server

Page 11: Android vs iOS encryption systems

Android vs. iOS Encryption

Apple iOS• The iOS uses a hardware accelerated AES-256 encryption to encrypt all data stored

in the flash memory of the device.

• The iOS protects specific additional data items, such as email using an additionallayer of encryption.

• Within 10 seconds of the device locking, the decryption keys for files in device arediscarded.

Android

• The primary encryption system on Android is a file-system basedencryption system based on dm-crypt

• Android recently began offering built in encryption in 3.0, earlier versions ofandroid contain no encryption capability, instead to rely on islolation andpermissions to safeguard data.

• A simple jailbreak of an android phone, or theft of device’s SD card can lead tosignificant loss of data.

• In this comparison always apple wins because it has tight security and much more.

Page 12: Android vs iOS encryption systems

Latest Implementation for Encryption in Different Devices

• Apple ready to unveil its next generation of iPads, also Google hasunwrapped Android 5.0 and accompanying phones and tablets.

• Like the iOS 8 that Apple delivered in September, Google’s latestiteration of Android — also dubbed L or Lollipop — brings a newlevel of information security via automatic encryption.

• What default encryption will do: Mandatory encryption willprovide additional assurances for healthcare organizationsconcerned about the data on Apple iPhones and iPads and thevarious smartphones and slates that run Google’s Android, Marcosaid.

Page 13: Android vs iOS encryption systems

Advantages and Disadvantages

Advantage

• Your device and your personal data are safe.

• No one can hack your personal information.

Disadvantages

• If your Encryption process is interrupted thenyour data will be lost.

• In case , If you forget Passcode or PIN orPassword then you have to format it.

Page 14: Android vs iOS encryption systems

Conclusion

• To facilitate this task, I have systematically

analyzed and assessed different encryption

systems for Android and iOS platform, which

provide the opportunity to protect security

critical and confidential data. In contrast to

other mobile platforms such as iOS,

BlackBerry, or Windows Phone,Android

features many more different but iOS is the

best.

Page 15: Android vs iOS encryption systems

References

1. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner, “iOS Encryption Systems: Deploying iOS Devices in Security-Critical Environments,” in Proceedings of the 10th International Conference on Security and Cryptography – SECRYPT 2013, Reykjavik, 2013

2. P. Teufl , Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer, “ Android Encryption Systems” [Online].Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6122788

3. Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei “A SDKEY-based Secure Storage andTransmission Approach for Android Phone” in International Conference on Cyber-EnabledDistributed Computing and Knowledge Discovery , 2014.

4. Zhaohui Wang ; Murmuria, R. ; Stavrou, A. Implementing and Optimizing an EncryptionFilesystem on Android[C], 2012 IEEE 13th International Conference on Mobile DataManagement (MDM), 2012 ,Page(s): 52 – 62.

5. Chen, Y. C. Y. and Ku, W.-S. K. W.-S. (2009). Self-Encryption Scheme for Data Security inMobile Devices.

Page 16: Android vs iOS encryption systems

Thanking You!

Any Questions???


Recommended