Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm

Authors

  • Deny Prasetyo Teknik Komputer - Universitas Diponegoro, Indonesia
  • Eko Didik Widianto Computer System Department, Universitas Diponegoro
  • Ike Pratiwi Indasari Computer System Department, Universitas Diponegoro

DOI:

https://doi.org/10.15575/join.v4i1.264

Keywords:

Android, Cryptography, Rivest-Shamir-Adleman, Short Message Service

Abstract

SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.

Author Biography

Deny Prasetyo, Teknik Komputer - Universitas Diponegoro

Mahasiswa tingkat akhir departemen Teknik Komputer - Universitas Diponegoro

References

Abdiansah, “Membangun SMS-Gateway Untuk Pengisian Pulsa Elektronik,” J. Sist. Inf., vol. 1, no. 2, pp. 62–71, 2009.

A. Saputra, Membangun Aplikasi SMS dengan PHP dan MySQL. Jakarta: Elex Media Komputindo, 2011.

W. Stallings, Cryptography and Network Security: Principles and Practices, 2005.

A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Taylor & Francis Inc, 1996.

Munsyi, A. Sudarsono, and M. U. H. Al Rasyid, “Secure Data Exchange Using Authenticated Attribute-Based Encryption with Revocation for Environmental Monitoring,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 5, p. 1948, Oct. 2018.

E. M. D. L. Reyes, A. M. Sison, and R. P. Medina, “File encryption based on reduced-round AES with revised round keys and key schedule,” Indones. J. Electr. Eng. Comput. Sci., vol. 16, no. 2, pp. 897–905, Nov. 2019.

D Ariyus, Kriptografi Keamanan Data dan Komunikasi. Yogyakarta: Graha Ilmu, 2006.

W. P. Atmojo, R. R. Isnanto, and R. Kridalukmana, “Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android,” J. Teknol. dan Sist. Komput., 2016.

P. Wicaksono, “Enkripsi Menggunakan Algoritma RSA, Makalah Ilmu Komputer,” 2013.

W. Stallings, Network and Internetwork Security Principle and Practice. Prentice Hall, 1995.

J. Katz, Introduction to Modern Cryptography, 2007.

M. Schader and A. Korthaus, The Unified Modeling Language: technical aspects and applications, 2012.

W. Ieee, “Managing the Development of Large Software Systems Dr. Winston W. Rovce Introduction,” no. August, pp. 1–9, 1970.

Hendra and Sukiman, “Aplikasi Pengaman Pertukaran SMS pada Perangkat Android dengan Metode RSA.”

B. Beizer and J. Wiley, “Black Box Testing: Techniques for Functional Testing of Software and Systems,” IEEE Softw., 2005.

Downloads

Published

2019-09-06

Issue

Section

Article

Citation Check

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.