473,396 Members | 2,024 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

encrypt a string in midlet

254 100+
i have a midlet which will generate a string (message ) and send to our gateway.

but before sending, i will need to encrypt the string.

i've checked anywhere in internet but couldn't find j2me API about encryption.

what is the simple way to encrypt that string in midlet ?

anyone idea?

from
Nick
Oct 23 '07 #1
6 2543
JosAH
11,448 Expert 8TB
What decryption method is used on the other side of the wire?

kind regards,

Jos
Oct 23 '07 #2
nickyeng
254 100+
What decryption method is used on the other side of the wire?

kind regards,

Jos
you mean gateway side ?

of course decryption method will be the compatible with encryption method in midlet side. Means will use same package for encryption and decryption methods.

is it necessary for developer to encrypt the message that is sending out in midlet internally ?

Without encryption, the message from midlet SMS out to our gateway ( sms://+12345 ), for example a string message "REGISTER 1234"...will it be intercepted by other people WHEN the time the message is on the way to gateway.... ?
Oct 24 '07 #3
JosAH
11,448 Expert 8TB
you mean gateway side ?

of course decryption method will be the compatible with encryption method in midlet side. Means will use same package for encryption and decryption methods.

is it necessary for developer to encrypt the message that is sending out in midlet internally ?

Without encryption, the message from midlet SMS out to our gateway ( sms://+12345 ), for example a string message "REGISTER 1234"...will it be intercepted by other people WHEN the time the message is on the way to gateway.... ?
Ah, ok; so the en/decryption methods are up to you? I don't know your configuration
but I'd say that nothing *un*crypted should exist starting from your DMZ to the
outside world. Internally things can just pass uncrypted from one peer to another.

About the en/decryption itself: how much processing power have you available?

kind regards,

Jos
Oct 24 '07 #4
nickyeng
254 100+
Ah, ok; so the en/decryption methods are up to you? I don't know your configuration
but I'd say that nothing *un*crypted should exist starting from your DMZ to the
outside world. Internally things can just pass uncrypted from one peer to another.

About the en/decryption itself: how much processing power have you available?

kind regards,

Jos
what do you mean by processing power ?

our midlet should be the smallest size like 300kb....
today, my supervisor do not like Bouncy Castle encryption/decryption OR JSR177 because importing those jar files willl make midlet size increases.

i'm not so good in packaging jar for midlet, Do i need to put Bouncy Castle jar files into the jar file that creates midlet (the jar for us to install midlet in phone--i use usb cable to put jar into phone and then install from phone) ?

cos i have a folder which holds alot of jar files that midlet needs under my application directory e.g. /MyApp/j2melib/
so when i hit the "Create Package" option from droplist, it creates one jar file and one jad file under /MyApp/deployed/ directory. /deployed/ directory is automatic created once hit the option.

my supervisor want me to copy "formula" and use it to create my own classes to have encryption function. I am so confused by what he meant "formula".

I have no idea about creating my own encrypt function. And even if i use Bouncy Castle package, console shows me Warning message.

what can i do now?
i'm stuck with this for 2 days already...
i am so fresh =.=

from noob
Nick
Oct 25 '07 #5
JosAH
11,448 Expert 8TB
what do you mean by processing power ?

our midlet should be the smallest size like 300kb....
Just as I wrote: "processing power" as in "how fast is your processor and how
much memory can you spare for the encryption process". As you described
your phone is quite small and I guess it's quite slow as well so a feasible and
valid option could be to implement a cheap and fast home brew encryption and
decryption algorithm.

How secure should your encryption method be? Can there be any communication
between the phone and the other side before the encrypted data is sent?

kind regards,

Jos
Oct 25 '07 #6
nickyeng
254 100+
Just as I wrote: "processing power" as in "how fast is your processor and how
much memory can you spare for the encryption process". As you described
your phone is quite small and I guess it's quite slow as well so a feasible and
valid option could be to implement a cheap and fast home brew encryption and
decryption algorithm.

How secure should your encryption method be? Can there be any communication
between the phone and the other side before the encrypted data is sent?

kind regards,

Jos
no communication with other side before the encryption.

Actually i just want a very small simple encryption function. You ask me like it is a very big process. hehe.

encrypt a string in phone and then send out(sms out) ... that's it.

thanks
from
Nick
Oct 26 '07 #7

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: shmoove | last post by:
Hi all, I'm a J2ME developer, with very little experience in WAP. I want to know if the following is possible on Nokia terminals: I would like to have a link in a WML page, that when it is pressed...
1
by: wqhdebian | last post by:
As far as I know,when encrypt or decrypt ,a key must first be got,and the key is first generate by a tool or from SecurityRandom,that means I can not generate the same key with the same input.Does...
8
by: toupeira23 | last post by:
Hello, I'm trying to encrypt passwords in my app. After discovering that there's no simple function to do this, I wrote a wrapper class which decodes a string using UTF8, encrypts it with...
2
by: fineman | last post by:
Hi all, I want to get a 64bit(8 bytes) Encrypt result use DES class in the VS2005. Though I encrypt data is 64bit(8 bytes), but DES return encrypt result that always is 128bit(16 bytes), I don't...
3
by: JDeats | last post by:
I have some .NET 1.1 code that utilizes this technique for encrypting and decrypting a file. http://support.microsoft.com/kb/307010 In .NET 2.0 this approach is not fully supported (a .NET 2.0...
0
by: lildiapaz | last post by:
Hi, everyone I'm developing a c# windows application that allows the user to encrypt any file type. i would like to encrypt the file using a powerful encrypting algorithm. I've tried to use the...
5
by: rpradeepa | last post by:
Hi, im getting this type of error in midlet program package javax.microedition.midlet does not exist package javax.microedition.io doaes not exist Welcomeform.java:4: package...
0
by: simsimlhr | last post by:
I want to load form inherited from Midlet(j2me) in lwuit form.Is there any way, i cannot convert the midlet into lwuit.
0
by: NitinSawant | last post by:
Hello, I'm working with Netbeans Mobility Pack (Sun java wireless toolkit 2.5), I've created small midlet, I'm adding "MYID" custom property(Attribute) to the midlet, I know...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.