Android Security Essay

Superior Essays
Analysis of Android Security

2. Application Signing and Distribution
• ANDROID-
Application signing is done to maintain the identity of the author or the developer of the application. Google ensures that the author or the vendor of the application signs the application with their key as their identity. Developers are required to sign their applications digitally using their private key and through this signature, trust is developed between Google and developers. All applications must be signed. Signature makes applications more tamper resistant because they are difficult to be broken. Once the application is developed, its .apk file is created and is signed with the private key of the developer. The embedded certs are self-signed by the
…show more content…
Android version greater than 3.0 supports whole disk encryption. Though it is not mandatory and only if the user chooses to encrypt the device he can do so from the device settings. Device Encryption has become mandatory for Android’s latest version 5.0. Various cryptographic algorithms are used for encryption. It also uses hardware based storage for the key using Trusted Execution Environment (TEE) signing capability. It uses 128 bit AES as the encryption algorithm with Cipher Block Chaining and SHA256. In version 5.0, when the device is booted for the first time, a 128 bit master key is generated using which the data on the device is encrypted. This master key is then encrypted with the device password (a default password if device is booted for the first time) and a stored salt. The resultant key is also signed through a TEE. The resultant is then used to encrypt and decrypt the master key. When a user changes the device password/pin or pattern, the disk master key is re-encrypted with the new password. Disk encryption makes the data safe on the device and protects it from someone to extract the data from it.
But as the password is used for encryption and if someone is successful in installing a key logger on the device one can get access to the passcode which is also used as a key to encrypt the device master

Related Documents

  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    But if the phone has no information on the phone then apple has wasted a lot of time. And if they do make a soft ware will they destroy it of lock it. But will Apple lose the court or will the win the Phone being…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The FBI Takes a Bite Out of Apple Imagine someone taking your phone and invading all your personal information. Thats was the Federal Bureau of Investigation (FBI) wanted to do to Syed Farook. Syed Farook is a gunman who killed 14 people. The FBI wanted Apple to write a new software so they could unlock Farook´s phone.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).One of the reasons supporters may take Apple's stance is because if Apple has the capability of creating a backdoor to their…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    3. Creating a master key to unlock Farooq’s iPhone, can not only be used to…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Forensic Investigations

    • 398 Words
    • 2 Pages

    Digital devices today, such as smartphones and computers, contain a plethora of information about its owner. During a forensic investigation, the investigator will happen upon many pieces of information that could be a personal secret, trade secret, or otherwise sensitive information. They will then have to determine the course of their actions based on the information that they come across. Digital devices contain a vast amount of information, much of which is irrelevant to a forensic investigation. In order for an investigator to perform the best investigation possible, they have to examine every aspect of a device in order to determine what information is relevant to the case.…

    • 398 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Cell Phone Literacy

    • 428 Words
    • 2 Pages

    I understand that my cell phone is the property of my parents, however, it is my responsibility to keep up with it and take care of it at all times. I understand that my parents may monitor the contents of my phone at any time. I will understand that must surrender my phone for monitoring when requested by my parents. I understand that I am not to change passwords or restrictions which my parents have set on my phone. I will never ignore texts or phone calls from my parents; all calls and texts from parents will be answered or returned immediately.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    However, Android has several channels in which users can download apps, and gives full availability without Android having to approve them…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This is done by linking in users actions to your app. They also use the “reward” process that you receive in a slot machine such as cranking the handle or hearing the alarms go off when you hit a jackpot except, on a phone, it’s the buzz in your pocket, the next picture you see on your Instagram feed, or the feeling you get when you finally beat a level in your favorite game. The joy you receive from participating. Apps are made to be addictive to continuously bring people back to play them. This is all backed up by the data as well.…

    • 1478 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Applications, or apps, as people now call it, are softwares that were invented for smartphones to download. It allows users to perform a specific task conveniently. For example, the app that Google created, Google Docs, allows users to create, edit, and delete documents on their Google Drive. I actually used Google Docs in a long car ride, which allowed me to be productive on some documents that I was required to edit and write on. Also, some smartphone companies have standard apps already included within the phone.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Waiting is so unusual that many of us can 't stand in a queue for 30 seconds without getting out our phones to check for messages or to Google something. As a result, phones are the new generation. Phones present multiple tasks. Even though smart phones can be dangerous by causing accidents, affecting people’s health, and affecting people’s safety, smart phones are high in demand because they a main key to communication and two-thirds Americans use a smart phone.…

    • 775 Words
    • 4 Pages
    Improved Essays