• Ishaq umar Muhammad Federal university of Lafia
  • Muhammad Mukhtar Liman
  • Joshua Abah
  • Timothy Moses
  • J. Agushaka
Keywords: Android Device, Bank SMS, Authentication, Notification, Security


This research is carried out for the development and implementation of an end-to-end encrypted Short Message Service (SMS) App, utilizing a hybrid cipher algorithm, driven by the notable insecurity observed in SMS communications on mobile devices. SMS is a widely used communication method, and the primary goal of this study is to create a system (App) for end-to-end encrypted SMS. Loss of phones is becoming vulnerable for threats, because we store vital records in android and these records are secret such that no other third party is required to see them, such as Bank SMS, Event Notification etc. Also this information can be compromised if android phone is been lost and found by the criminals. Kidnapping activity is serious case happening in northern part of Nigeria, so if a phone is being lost and discovered how financed he is (the device holder), there is any means of bank account compromisation as that would allow the bank to give some information about the account because of the registered SIM card inserted in android devices (phones). This system is aimed to secure Bank SMS by not allowing an unauthorized person to views the banks SMS, but all other SMS can be view. Whenever the Banks SMS is received by the Android phone, the system will encrypt it and can only be viewed if using correct decryption key, a notification will be sent to the owner other phone if more than two attempt to view the message is made, using a Hybrid Cipher...


Abah, J. (2022). Mobile Security: A Review 1. 6(1), 601004.

Abiodun, M. K., Imoize, A. L., Awotunde, J. B., Lee, C.-C., Adeniyi, A. E., Chioma, U., & Li10, C.-T. (2023). Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems. Journal of Library and Information Studies, 21(2), 1–26.

Agwanyanjaba, W. O. (2020). Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push. University of Nairobi.

Ahmad, Z., Ong, T. S., Gan, Y. W., Liew, T. H., & Norhashim, M. (2022). Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables. Applied Sciences (Switzerland), 12(9). DOI:

Akande, O. N., Gbenle, O., Abikoye, O. C., Jimoh, R. G., Akande, H. B., Balogun, A. O., & Fatokun, A. (2023). SMSPROTECT: An automatic smishing detection mobile application. ICT Express, 9(2), 168–176. DOI:

Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Abdelhag, M. (2018). Mobile Cloud Computing: Challenges and Future Research Directions. Proceedings - International Conference on Developments in ESystems Engineering, DeSE, February 2018, 62–67. DOI:

Almomani, I. M., & Khayer, A. Al. (2020). A Comprehensive Analysis of the Android Permissions System. IEEE Access, 8. DOI:

Alsaffar, M., Aljaloud, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Almurayziq, T. S., Alshammari, G., & Alshammari, A. (2022). Detection of Web Cross-Site Scripting (XSS) Attacks. Electronics (Switzerland), 11(14), 1–13. DOI:

Altulaihan, E., & Almaiah, M. A. (2022). Cybersecurity Threats , Countermeasures and Mitigation Techniques on the IoT : Future Research Directions. 1–41. DOI:

Anmulwar, S., Srivastava, S., Mahajan, S. P., Gupta, A. K., & Kumar, V. (2019). Rogue access point detection methods: A review. 2014 International Conference on Information Communication and Embedded Systems, ICICES 2014, July 2018. DOI:

Aqel, M. J., Naqshbandi, O. A., Sokiyna, M., & Valentyn, P. (2020). Messaging System Design Based on Using Servers and Encoding System. 14(10), 107–127. DOI:

Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41(February 2019), 55–69. DOI:

Bekkem Sumanth Reddy, M. S. P. H. S. S. K. (2021). IRJET- Android based Secure End to End Encrypted SMS System. Irjet, 8(4), 2982–2988.

Bongard-Blanchy, K., Sterckx, J. L., Rossi, A., Distler, V., Rivas, S., & Koenig, V. (2022). An (Un)Necessary Evil - Users’ (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering. Proceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022, 173–180. DOI:

Callanan, C. (2021). User tolerance of privacy abuse on mobile Internet and the country level of development. September 2019. DOI:

Chin, Amita; Jones, Beth; Little, P. (2021). A Comparative Analysis of Smartphone Security Behaviors and Practices Amita Chin Virginia Commonwealth University , United States Beth Jones Western Carolina University , United States Philip Little. 17(3), 57–80.

Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2020). Measuring user confidence in smartphone security and privacy. SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security, 1. DOI:

Ciaramitaro, B., & Pavlov, V. (2011). Mobile security. In Mobile Technology Consumption: Opportunities and Challenges. DOI:

David-West, O., Oni, O., & Ashiru, F. (2022). Diffusion of innovations: Mobile money utility and financial inclusion in Nigeria. Insights from agents and unbanked poor end users. Information Systems Frontiers, 24(6), 1753–1773. DOI:

Ekwonwune, E. N., & Enyinnaya, V. C. (2020). Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm. Journal of Software Engineering and Applications, 13(03), 25–40. DOI:

Elueze, C. N., & Obasi, C. U. (2022). 5G and The Industry: A Case of the Nigerian Financial Technology Sector.

Elvira Cruz, I. (2023). Design of a methodology for the selection of mobile payment technologies in developing countries.

Enyinnaya, V. C., Ekwonwune, E. N., Osuagwu, O. E., Agbakuru, A. O., & Amanze, B. C. (2021). Applications of End-to-End Encrypted Short Message Service ( SMS ) using Hybrid Encryption Algorithm. 12(6), 176–181.

Evans. (2018). Improved financial performance without improved operational efficiency: The case of Nigerian firms. Forum Scientiae Oeconomia, 6, 25.

Ferm, L.-E. C., & Thaichon, P. (2021). Customer pre-participatory social media drivers and their influence on attitudinal loyalty within the retail banking industry: A multi-group analysis utilizing social exchange theory. Journal of Retailing and Consumer Services, 61, 102584. DOI:

Fletcher, B. (2019). Application using ECC algorithm and QR.pdf.

Frik, A., Kim, J., Sanchez, J. R., & Ma, J. (2022). Users ’ Expectations About and Use of Smartphone Privacy and Security Settings. DOI:

Garba, F. A. (2019). TextFort: An Efficient Hybrid Short Message Service Encryption Scheme for Mobile Devices. Scientific and Practical Cyber Security Journal.

Ghadirli, H. M., Nodehi, A., & Enayatifar, R. (2019). An overview of encryption algorithms in color images. Signal Processing, 164(September 2018), 163–185. DOI:

Grandis, mohamad regiana, & Yunanto, R. (2020). Jurnal Teknik Informatika, Vol. 12, No. 2, April 2020. Jurnal Teknik Informatika, 12(2), 46–51.

Gupta, B. B., & Narayan, S. (2020). A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures. Journal of Global Information Management (JGIM), 28(4), 135–159. DOI:

Hatamian, M., Wairimu, S., Momen, N., & Fritsch, L. (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. In Empirical Software Engineering (Vol. 26, Issue 3). Empirical Software Engineering. DOI:

Jameaba, M.-S. (2022). Digitalization, Emerging Technologies, and Financial Stability: Challenges and Opportunities for the Indonesian Banking Industry and Beyond. DOI:

Kalipi, A. (2023). Exploring the awareness of security threats associated with short-message service (sms) and protective measures against sms security threats amongst students at the University of Namibia (UNAM). University of Namibia.

Kim, Y., Oh, T., & Kim, J. (2023). Analyzing User Awareness of Privacy Data Leak in Mobile Applications. Mobile Information Systems. DOI:

Krupp, B., Sridhar, N., & Zhao, W. (2017). SPE: Security and Privacy Enhancement Framework for Mobile Devices. IEEE Transactions on Dependable and Secure Computing, 14(4), 433–446. DOI:

Lei, Z., Nan, Y., Fratantonio, Y., & Bianchi, A. (2021). On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. February. DOI:

Liu, E., Rao, S., Havron, S., Ho, G., Savage, S., Voelker, G. M., & McCoy, D. (2023). No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proceedings on Privacy Enhancing Technologies, 2023(1), 207–224. DOI:

Logunleko, A. M., Logunleko, K. B., Lawal, O. O., Ezugwu, O. O. D., & Akinyemi, O. S. (2021). A Secured Mobile Money Transaction Using Data Masking and Enhanced Base64 Algorithm. Int. J. Recent Contributions Eng. Sci. IT, 9(1), 17–32. DOI:

Ma, S., & Chen, C. (2023). Are digital natives overconfident in their privacy literacy? Discrepancy between self-assessed and actual privacy literacy, and their impacts on privacy protection behavior. Frontiers in Psychology, 14(June 2022), 1–11. DOI:

Mabruri, A. S. (2020). Data Security System of Text Messaging Based on Android Mobile Devices Using Advanced Encrytion Standard Dynamic. October 2000, 39–46.

Menard, P., & Bott, G. J. (2020). Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment. Computers and Security, 95, 101856. DOI:

Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27, 1515–1555. DOI:

Noviandy, T. R., Idroes, G. M., Maulana, A., Hardi, I., Ringga, E. S., & Idroes, R. (2023). Credit Card Fraud Detection for Contemporary Financial Management Using XGBoost-Driven Machine Learning and Data Augmentation Techniques. Indatu Journal of Management and Accounting, 1(1), 29–35. DOI:

Omolara, A. E., Jantan, A., Abiodun, O. I., Dada, K. V., Arshad, H., & Emmanuel, E. (2019). A deception model robust to eavesdropping over communication for social network systems. IEEE Access, 7, 100881–100898. DOI:

Onuwabhagbe OGBEIDE, V., OMOROGIUWA, O., & Eturpa SALAMI, E. (2023). an Empirical Survey To Substantiate the Need for a Cyber Security Framework for Smes in Nigeria. International Journal of Research Publications, 128(1), 9–24. DOI:

Otor, S. U., Akumba, B. O., Idikwu, J. S., & Achika, I. P. (2020). An Improved Security Model for Nigerian Unstructured Supplementary Services Data Mobile Banking Platform. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 6(3), 974–987. DOI:

Pazarbasioglu, C., Mora, A. G., Uttamchandani, M., Natarajan, H., Feyen, E., & Saal, M. (2020). Digital financial services. World Bank, 54.

Prince, C., Omrani, N., Maalaoui, A., Dabic, M., & Kraus, S. (2023). Are We Living in Surveillance Societies and Is Privacy an Illusion? An Empirical Study on Privacy Literacy and Privacy Concerns. IEEE Transactions on Engineering Management, 70, 3553–3570. DOI:

Priya, D., Reddi, T., Reddy, M. S. T., Khan, M. K., & others. (2023). A Comprehensive Examination of Email Spoofing: Issues and Prospects for Email Security. Computers & Security, 103600. DOI:

Radhi, S. M., & Ogla, R. (2023). In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish. Iraqi Journal of Computers, Communications, Control and Systems Engineering, 23(3), 125–138. DOI:

Raharja, I. M. S., & Ashari, A. (2021). Enhancing Security System of Short Message Service for Banking Transaction. International Journal of Computing, 20(1), 31–38. DOI:

Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43.

Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., & Seamons, K. (2019). A usability study of five two-factor authentication methods. Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019, 357–370.

Rihan, S. D., Khalid, A., Eldin, S., & Osman, F. (2019). A Performance Comparison of Encryption Algorithms AES and DES. International Journal of Engineering Research & Technology (IJERT), 4(12), 151–154.

Sagheer, A. M., Abdulhameed, A. A., & Abduljabbar, M. A. (2019). SMS security for smartphone. Proceedings - 2013 6th International Conference on Developments in ESystems Engineering, DeSE 2013, February 2015, 281–285. DOI:

Salim, A., Sagheer, A. M., & Yaseen, L. (2019). Design and Implementation of a Secure Mobile Banking System Based on Elliptic Curve Integrated Encryption Schema. International Conference on Applied Computing to Support Industry: Innovation and Technology, 424–438. DOI:

Sandhu, S., & Arora, S. (2022). Customers’ usage behaviour of e-banking services: Interplay of electronic banking and traditional banking. International Journal of Finance & Economics, 27(2), 2169–2181. DOI:

Sari, M., Purnomo, H. D., & Sembiring, I. (2022). Review : Algoritma Kriptografi Sistem Keamanan SMS di Android. Journal of Information Technology, 2(1), 11–15. DOI:

Scholar, M. T., & RGMCET, N. (2023). Easy and Secure Smart SMS Protocol on M-Health Environment in Mobile Computing.

Shen, B., Wei, L., Xiang, C., Wu, Y., Shen, M., Zhou, Y., & Jin, X. (2021). Can systems explain permissions better? Understanding users’ misperceptions under smartphone runtime permission model. Proceedings of the 30th USENIX Security Symposium, 751–768.

Shuba, A., Bakopoulou, E., & Markopoulou, A. (2018). Privacy Leak Classification on Mobile Devices. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2018-June(i). DOI:

Sitkowski, M., & Simulation, D. (2018). Securely Encrypting Data At Rest. February.

Souppaya, M., & Scarfone, K. (2023). Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST Special Publication 800-124, Revision 1, 1–30.

Stirparo, P. (2015). MobiLeak : security and privacy of personal data in mobile applications.

Thabit, F., Can, O., Wani, R. U. Z., Qasem, M. A., Thorat, S. B., & Alkhzaimi, H. A. (2023). Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms. Concurrency and Computation: Practice and Experience, e7691. DOI:

Ullah, I., Boreli, R., & Kanhere, S. S. (2023). Privacy in targeted advertising on mobile devices : a survey. International Journal of Information Security, 22(3), 647–678. DOI:

Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., & Kikiras, P. (2016). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015, 49–57. DOI:

Visconti, A. (2018). The Dangers of Rooting : Data Leakage Detection in. 2018. DOI:

Vishnuvardhan, B., Manjula, B., & Lakshman Naik, R. (2020). A study of digital banking: Security issues and challenges. Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, 163–185. DOI:

Wang, C., Wang, Y., Chen, Y., Liu, H., & Liu, J. (2020). User authentication on mobile devices: Approaches, threats and trends. Computer Networks, 170, 107118. DOI:

Yadav, C. S., Singh, J., Yadav, A., Pattanayak, H. S., Kumar, R., Khan, A. A., Haq, M. A., Alhussen, A., & Alharby, S. (2022). Malware Analysis in IoT & Android Systems with Defensive Mechanism. Electronics (Switzerland), 11(15), 1–20. DOI:

Yusuf, M., Gimba, U. A., Bello, A. U., Adamu, A. H., Salisu, S., State, J., & Science, C. (2019). Two Way Authentication for Android Mobile Phones. 5(1), 179–186.

How to Cite