SlideShare a Scribd company logo
Android And iOS Encryption Systems
BY GROUP 4: Riya Chauhan(141060753016)
Birju Tank((141060753017)
Naman Vaishnav((141060753018)
Dhara Patel((141060753019)
Okasha Mahi((141060753020)
DATE:17/04/2015
IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 )
At: GTU PG SCHOOL,GANDHINAGAR
Contents
• What is Encryption?-Introduction
• Encryption and Different Mobile Devices
• Android Encryption Systems
• iOS Encryption Systems
• Android vs. iOS Encryption
• Latest Implementation for Encryption in
Different Devices
• Advantages and Disadvantages
• Conclusion
• References
What is Encryption?-Introduction
• Security and privacy are hot topic this days, with government snooping, big
company data leaks, and hacking on rise.
• One important step you can take to protect your information is to encrypt it.
This is especially true for devices that tend to get lost or stolen such as
your cell phone.
• For many people that's worth it to keep personal information truly private
and secured. Also, mobile professionals working in certain industries--
finance and healthcare,
• For example--encryption isn't optional. All devices that store or access
consumers' personally identifiable information have to be secured or else
you're not in compliance with the law
Encryption and Different Mobile
Devices
• First, you might be wondering why you should even bother with encrypting your
mobile device, especially if you don’t store much or any personal information on it.
And if you already have a lock Screen with pass code (or other unlock
measure),isn’t that good enough?
• The answer is encryption does more than just bar a person from accessing
information on your cell phone, as the lock screen does.
• Encrypting your data takes it a step further. It makes the information unreadable--
in deep, useless--even if somehow a hacker got through the lock screen.
• Example: You can think of the lock screen as a lock on a door Without the key,
uninvited guests can't come in and steal all your belongings (Using the door
analogy, even if a thief comes in through the window, encryption is like creating a
mirage so all the things in your home look like they're in a super uncrackable safe.)
Cont..
Apple iOS
• The iOS denies access under all circumstances to many of the device’s
sensitive subsystems. Thus increasing the security of iOS based devices
since it removes the user from security decision-making process.
Android
• The Android permission system relies on the user to make all policy
decisions and decide whether an apps requested combination of permission
is safe or not.
Blackberry (BB10):
• introduces us to Blackberry Balance. Balance allows organizations to
create isolation between personal and work environments on a device
When Balance is enabled, workspace is automatically encrypted, leaving
personal environment unencrypted.
Windows Phone 8:
• WP8 uses the Unified Extensible Firmware Interface for secure boot,
ensuring devices do not load rooted or unauthorized system images.
• WP8 apps run in isolated “chambers”, which are similar to sandbox. The
data between the applications is shared in the cloud and not on the device.
Android Encryption Systems
Fig: Overview of the Android dm-crypt
based encryption system. The whole file
system is encrypted and the required file-
system master key is protected by a key
derived from the user’s passcode.
Before Start encrypting set your PIN
• Types of Android Encryption System
1. File-System Encryption – Dm-crypt
2. Android Key Chain
3. Backup
Encrypt Your Android Smartphone or
Tablet
Step:1 Tap Here
Step:2Click on Encrypt
Phone
Step:3 You’ll see a progress indicator
appear with Warning
Cont..
Your Device is encrypting now
iOS Encryption Systems
• Encrypt Your iPhone or iPad Data
• Step One: Set up a passcode to lock your device under Settings > General >
Passcode Lock.The PIN or passcode not only creates a lockscreen, it also
encrypts the iPhone data or iPad data.
• Not all of it, however. The only things that are encrypted in this dead-easy
method are your iMessages, mail messages and attachments, and data from
some apps that have data encryption.
• OS X and iOS provide a number of encryption technologies. Of these, three
APIs are available on both iOS and OS X:
1. Keychain Services API—provides secure storage for passwords, keys, and
so on
2. Cryptographic Message Syntax—provides (nonstreaming) symmetric and
asymmetric encryption and decryption
3. Certificate, Key, and Trust Services—provides cryptographic support
services and trust validation
Cont..
1. Set your pass code
Set “ON”Encrypt
3. Encrypted Server
Android vs. iOS Encryption
Apple iOS
• The iOS uses a hardware accelerated AES-256 encryption to encrypt all data stored
in the flash memory of the device.
• The iOS protects specific additional data items, such as email using an additional
layer of encryption.
• Within 10 seconds of the device locking, the decryption keys for files in device are
discarded.
Android
• The primary encryption system on Android is a file-system based
encryption system based on dm-crypt
• Android recently began offering built in encryption in 3.0, earlier versions of
android contain no encryption capability, instead to rely on islolation and
permissions to safeguard data.
• A simple jailbreak of an android phone, or theft of device’s SD card can lead to
significant loss of data.
• In this comparison always apple wins because it has tight security and much more.
Latest Implementation for Encryption
in Different Devices
• Apple ready to unveil its next generation of iPads, also Google has
unwrapped Android 5.0 and accompanying phones and tablets.
• Like the iOS 8 that Apple delivered in September, Google’s latest
iteration of Android — also dubbed L or Lollipop — brings a new
level of information security via automatic encryption.
• What default encryption will do: Mandatory encryption will
provide additional assurances for healthcare organizations
concerned about the data on Apple iPhones and iPads and the
various smartphones and slates that run Google’s Android, Marco
said.
Advantages and Disadvantages
Advantage
• Your device and your personal data are safe.
• No one can hack your personal information.
Disadvantages
• If your Encryption process is interrupted then
your data will be lost.
• In case , If you forget Passcode or PIN or
Password then you have to format it.
Conclusion
• To facilitate this task, I have systematically
analyzed and assessed different encryption
systems for Android and iOS platform, which
provide the opportunity to protect security
critical and confidential data. In contrast to
other mobile platforms such as iOS,
BlackBerry, or Windows Phone,Android
features many more different but iOS is the
best.
References
1. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner, “iOS Encryption Systems:
Deploying iOS Devices in Security-Critical Environments,” in Proceedings of the 10th
International Conference on Security and Cryptography – SECRYPT 2013, Reykjavik, 2013
2. P. Teufl , Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas
Zefferer, “ Android Encryption Systems”
[Online].Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6122788
3. Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei “A SDKEY-based Secure Storage and
Transmission Approach for Android Phone” in International Conference on Cyber-Enabled
Distributed Computing and Knowledge Discovery , 2014.
4. Zhaohui Wang ; Murmuria, R. ; Stavrou, A. Implementing and Optimizing an Encryption
Filesystem on Android[C], 2012 IEEE 13th International Conference on Mobile Data
Management (MDM), 2012 ,Page(s): 52 – 62.
5. Chen, Y. C. Y. and Ku, W.-S. K. W.-S. (2009). Self-Encryption Scheme for Data Security in
Mobile Devices.
Thanking You!
Any Questions???

More Related Content

PDF
Mobile Device Encryption Systems
PPTX
iOS Basics
PPTX
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
PDF
IOS Encryption Systems
PPTX
Android vs iOS security
PPTX
Apple iOS Introduction
PPTX
Presentation on iOS
PPTX
i Operating system
Mobile Device Encryption Systems
iOS Basics
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
IOS Encryption Systems
Android vs iOS security
Apple iOS Introduction
Presentation on iOS
i Operating system

What's hot (20)

PPTX
Apple's ios
PPTX
iOS I phone operating system
PDF
The Android vs. Apple iOS Security Showdown
PDF
Android vs. iPhone for Mobile Security
PPTX
iOS Operating System
PPTX
Android & IOS
PDF
DefCon 2012 - Gaining Access to User Android Data
PPTX
Layer architecture of ios (1)
PPTX
Ios operating system
PPTX
Apple ios
PPTX
iOS: Overview, Architecture, Development & Versions
PPT
Jail breaking
PPTX
Apple iOS
PPTX
Ios seminar
PDF
Introduction to ios
PPTX
Apple iOS - A modern way to mobile operating system
PDF
I phone programming project report
PPTX
iOS - History of iOS
PPTX
iOS Security and Encryption
PPT
Srinumanne ios operating system ppt
Apple's ios
iOS I phone operating system
The Android vs. Apple iOS Security Showdown
Android vs. iPhone for Mobile Security
iOS Operating System
Android & IOS
DefCon 2012 - Gaining Access to User Android Data
Layer architecture of ios (1)
Ios operating system
Apple ios
iOS: Overview, Architecture, Development & Versions
Jail breaking
Apple iOS
Ios seminar
Introduction to ios
Apple iOS - A modern way to mobile operating system
I phone programming project report
iOS - History of iOS
iOS Security and Encryption
Srinumanne ios operating system ppt
Ad

Viewers also liked (8)

PPTX
prop-115: Registration of detailed assignment information in whois DB
PPTX
Seminar on Encryption and Authenticity
PDF
flashcache原理及改造
PPT
Device mapper multipathing
PPTX
Steganography
PDF
Mobile Application Security Code Reviews
PPS
Comparison and contrast essays aug152013
PDF
Tuning android for low ram devices
prop-115: Registration of detailed assignment information in whois DB
Seminar on Encryption and Authenticity
flashcache原理及改造
Device mapper multipathing
Steganography
Mobile Application Security Code Reviews
Comparison and contrast essays aug152013
Tuning android for low ram devices
Ad

Similar to Android vs iOS encryption systems (20)

PDF
PDF
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
PDF
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
PDF
Consumer_Device_Privacy
PDF
liferay-safe-slides.pdf
PPTX
iPhone and iPad Security
PDF
5 Ways to Protect your Mobile Security
PPTX
PDF
NWSLTR_Volume12_Issue1
PDF
iPhone Data Protection in Depth
PPTX
[OWASP Poland Day] Saving private token
PDF
Security - Part II.pdf
PDF
A Novel Key Generation Technique Used In Tablets and Smart Phones
PDF
Mobile Security Training, Mobile Device Security Training
ODP
Cell phone security lite
PDF
Mac security - a pragmatic guide
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
PDF
Bringing Government and Enterprise Security Controls to the Android Endpoint
PDF
Attacking and Defending Apple iOS Devices
PDF
iOS secure app development
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
Consumer_Device_Privacy
liferay-safe-slides.pdf
iPhone and iPad Security
5 Ways to Protect your Mobile Security
NWSLTR_Volume12_Issue1
iPhone Data Protection in Depth
[OWASP Poland Day] Saving private token
Security - Part II.pdf
A Novel Key Generation Technique Used In Tablets and Smart Phones
Mobile Security Training, Mobile Device Security Training
Cell phone security lite
Mac security - a pragmatic guide
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Bringing Government and Enterprise Security Controls to the Android Endpoint
Attacking and Defending Apple iOS Devices
iOS secure app development

More from Birju Tank (14)

PPTX
Database security
PPTX
Vulnerabilities in Android
PPTX
Blackhole Attck detection in AODV Protocol
PPTX
5 g technology
DOCX
Literature review report
PPTX
Secure routing in DSR
PPTX
J2ME Mobile app
PPTX
Software prototyping
PPTX
Secure lab setup for cyber security
PPTX
Data mining
PPTX
Android operating system
PPT
Virtualization
PPTX
Mobile Broadband Wireless Access
PPTX
Process management
Database security
Vulnerabilities in Android
Blackhole Attck detection in AODV Protocol
5 g technology
Literature review report
Secure routing in DSR
J2ME Mobile app
Software prototyping
Secure lab setup for cyber security
Data mining
Android operating system
Virtualization
Mobile Broadband Wireless Access
Process management

Recently uploaded (20)

PPTX
web development for engineering and engineering
PDF
PPT on Performance Review to get promotions
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Sustainable Sites - Green Building Construction
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
web development for engineering and engineering
PPT on Performance Review to get promotions
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
additive manufacturing of ss316l using mig welding
Sustainable Sites - Green Building Construction
Automation-in-Manufacturing-Chapter-Introduction.pdf
Internet of Things (IOT) - A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
OOP with Java - Java Introduction (Basics)
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

Android vs iOS encryption systems

  • 1. Android And iOS Encryption Systems BY GROUP 4: Riya Chauhan(141060753016) Birju Tank((141060753017) Naman Vaishnav((141060753018) Dhara Patel((141060753019) Okasha Mahi((141060753020) DATE:17/04/2015 IEEE Seminar on Advanced Programming on Mobile Devices – I ( 3725304 ) At: GTU PG SCHOOL,GANDHINAGAR
  • 2. Contents • What is Encryption?-Introduction • Encryption and Different Mobile Devices • Android Encryption Systems • iOS Encryption Systems • Android vs. iOS Encryption • Latest Implementation for Encryption in Different Devices • Advantages and Disadvantages • Conclusion • References
  • 3. What is Encryption?-Introduction • Security and privacy are hot topic this days, with government snooping, big company data leaks, and hacking on rise. • One important step you can take to protect your information is to encrypt it. This is especially true for devices that tend to get lost or stolen such as your cell phone. • For many people that's worth it to keep personal information truly private and secured. Also, mobile professionals working in certain industries-- finance and healthcare, • For example--encryption isn't optional. All devices that store or access consumers' personally identifiable information have to be secured or else you're not in compliance with the law
  • 4. Encryption and Different Mobile Devices • First, you might be wondering why you should even bother with encrypting your mobile device, especially if you don’t store much or any personal information on it. And if you already have a lock Screen with pass code (or other unlock measure),isn’t that good enough? • The answer is encryption does more than just bar a person from accessing information on your cell phone, as the lock screen does. • Encrypting your data takes it a step further. It makes the information unreadable-- in deep, useless--even if somehow a hacker got through the lock screen. • Example: You can think of the lock screen as a lock on a door Without the key, uninvited guests can't come in and steal all your belongings (Using the door analogy, even if a thief comes in through the window, encryption is like creating a mirage so all the things in your home look like they're in a super uncrackable safe.)
  • 5. Cont.. Apple iOS • The iOS denies access under all circumstances to many of the device’s sensitive subsystems. Thus increasing the security of iOS based devices since it removes the user from security decision-making process. Android • The Android permission system relies on the user to make all policy decisions and decide whether an apps requested combination of permission is safe or not. Blackberry (BB10): • introduces us to Blackberry Balance. Balance allows organizations to create isolation between personal and work environments on a device When Balance is enabled, workspace is automatically encrypted, leaving personal environment unencrypted. Windows Phone 8: • WP8 uses the Unified Extensible Firmware Interface for secure boot, ensuring devices do not load rooted or unauthorized system images. • WP8 apps run in isolated “chambers”, which are similar to sandbox. The data between the applications is shared in the cloud and not on the device.
  • 6. Android Encryption Systems Fig: Overview of the Android dm-crypt based encryption system. The whole file system is encrypted and the required file- system master key is protected by a key derived from the user’s passcode. Before Start encrypting set your PIN • Types of Android Encryption System 1. File-System Encryption – Dm-crypt 2. Android Key Chain 3. Backup
  • 7. Encrypt Your Android Smartphone or Tablet Step:1 Tap Here Step:2Click on Encrypt Phone Step:3 You’ll see a progress indicator appear with Warning
  • 8. Cont.. Your Device is encrypting now
  • 9. iOS Encryption Systems • Encrypt Your iPhone or iPad Data • Step One: Set up a passcode to lock your device under Settings > General > Passcode Lock.The PIN or passcode not only creates a lockscreen, it also encrypts the iPhone data or iPad data. • Not all of it, however. The only things that are encrypted in this dead-easy method are your iMessages, mail messages and attachments, and data from some apps that have data encryption. • OS X and iOS provide a number of encryption technologies. Of these, three APIs are available on both iOS and OS X: 1. Keychain Services API—provides secure storage for passwords, keys, and so on 2. Cryptographic Message Syntax—provides (nonstreaming) symmetric and asymmetric encryption and decryption 3. Certificate, Key, and Trust Services—provides cryptographic support services and trust validation
  • 10. Cont.. 1. Set your pass code Set “ON”Encrypt 3. Encrypted Server
  • 11. Android vs. iOS Encryption Apple iOS • The iOS uses a hardware accelerated AES-256 encryption to encrypt all data stored in the flash memory of the device. • The iOS protects specific additional data items, such as email using an additional layer of encryption. • Within 10 seconds of the device locking, the decryption keys for files in device are discarded. Android • The primary encryption system on Android is a file-system based encryption system based on dm-crypt • Android recently began offering built in encryption in 3.0, earlier versions of android contain no encryption capability, instead to rely on islolation and permissions to safeguard data. • A simple jailbreak of an android phone, or theft of device’s SD card can lead to significant loss of data. • In this comparison always apple wins because it has tight security and much more.
  • 12. Latest Implementation for Encryption in Different Devices • Apple ready to unveil its next generation of iPads, also Google has unwrapped Android 5.0 and accompanying phones and tablets. • Like the iOS 8 that Apple delivered in September, Google’s latest iteration of Android — also dubbed L or Lollipop — brings a new level of information security via automatic encryption. • What default encryption will do: Mandatory encryption will provide additional assurances for healthcare organizations concerned about the data on Apple iPhones and iPads and the various smartphones and slates that run Google’s Android, Marco said.
  • 13. Advantages and Disadvantages Advantage • Your device and your personal data are safe. • No one can hack your personal information. Disadvantages • If your Encryption process is interrupted then your data will be lost. • In case , If you forget Passcode or PIN or Password then you have to format it.
  • 14. Conclusion • To facilitate this task, I have systematically analyzed and assessed different encryption systems for Android and iOS platform, which provide the opportunity to protect security critical and confidential data. In contrast to other mobile platforms such as iOS, BlackBerry, or Windows Phone,Android features many more different but iOS is the best.
  • 15. References 1. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner, “iOS Encryption Systems: Deploying iOS Devices in Security-Critical Environments,” in Proceedings of the 10th International Conference on Security and Cryptography – SECRYPT 2013, Reykjavik, 2013 2. P. Teufl , Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer, “ Android Encryption Systems” [Online].Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6122788 3. Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei “A SDKEY-based Secure Storage and Transmission Approach for Android Phone” in International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery , 2014. 4. Zhaohui Wang ; Murmuria, R. ; Stavrou, A. Implementing and Optimizing an Encryption Filesystem on Android[C], 2012 IEEE 13th International Conference on Mobile Data Management (MDM), 2012 ,Page(s): 52 – 62. 5. Chen, Y. C. Y. and Ku, W.-S. K. W.-S. (2009). Self-Encryption Scheme for Data Security in Mobile Devices.