IMPLEMENTASI algoritma ecdh dan aes untuk pengaman pesan sms pada telepon seluler berbasis android

SMS is currently a need for mobile phone users communicated with others. But cell phone users do not realize that the messages sent can be tapped or altered by unintended parties. That requires a security system in sending SMS messages is cryptography. With limited resources on the mobile phone, the...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: , Muhammad Rafi'i S.Kom, , Prof. Drs. Jazi Eko Istiyanto, M.Sc, Ph.D.
التنسيق: Theses and Dissertations NonPeerReviewed
منشور في: [Yogyakarta] : Universitas Gadjah Mada 2014
الموضوعات:
ETD
الوصول للمادة أونلاين:https://repository.ugm.ac.id/125707/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=65881
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:SMS is currently a need for mobile phone users communicated with others. But cell phone users do not realize that the messages sent can be tapped or altered by unintended parties. That requires a security system in sending SMS messages is cryptography. With limited resources on the mobile phone, then the implementation of symmetric cryptographic technique is suitable to meet the security needs of an SMS message. On symmetric cryptography there is a symmetric key for encryption and decryption. Symmetric key exchange in order to secure the public channel we need a protocol for key exchanges. This research implements the AES symmetric cryptography for encryption and decryption of messages while applying the key exchange protocol Ecliptic Curve Diffie - Hellman (ECDH). This protocol is used to create a shared key that will be used for encryption and decryption of messages. The system is built using the Java programming language based ADK (Android Development Tools). Based on testing of the system indicates that the system can function well and both the encryption algorithm can be implemented for SMS on mobile phones based on Android. In the research found that the length of the message to be increased as much as n state multiplied by 4/3 and can be kept confidential, and authentication.