IMPLEMENTASI algoritma ecdh dan aes untuk pengaman pesan sms pada telepon seluler berbasis android
SMS is currently a need for mobile phone users communicated with others. But cell phone users do not realize that the messages sent can be tapped or altered by unintended parties. That requires a security system in sending SMS messages is cryptography. With limited resources on the mobile phone, the...
Saved in:
Main Authors: | , |
---|---|
Format: | Theses and Dissertations NonPeerReviewed |
Published: |
[Yogyakarta] : Universitas Gadjah Mada
2014
|
Subjects: | |
Online Access: | https://repository.ugm.ac.id/125707/ http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=65881 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universitas Gadjah Mada |
Summary: | SMS is currently a need for mobile phone users communicated with others.
But cell phone users do not realize that the messages sent can be tapped or altered
by unintended parties. That requires a security system in sending SMS messages
is cryptography. With limited resources on the mobile phone, then the
implementation of symmetric cryptographic technique is suitable to meet the
security needs of an SMS message. On symmetric cryptography there is a
symmetric key for encryption and decryption. Symmetric key exchange in order
to secure the public channel we need a protocol for key exchanges.
This research implements the AES symmetric cryptography for encryption
and decryption of messages while applying the key exchange protocol Ecliptic
Curve Diffie - Hellman (ECDH). This protocol is used to create a shared key that
will be used for encryption and decryption of messages. The system is built using
the Java programming language based ADK (Android Development Tools). Based
on testing of the system indicates that the system can function well and both the
encryption algorithm can be implemented for SMS on mobile phones based on
Android. In the research found that the length of the message to be increased as
much as n state multiplied by 4/3 and can be kept confidential, and authentication. |
---|