IMPLEMENTASI algoritma ecdh dan aes untuk pengaman pesan sms pada telepon seluler berbasis android

SMS is currently a need for mobile phone users communicated with others. But cell phone users do not realize that the messages sent can be tapped or altered by unintended parties. That requires a security system in sending SMS messages is cryptography. With limited resources on the mobile phone, the...

全面介紹

Saved in:
書目詳細資料
Main Authors: , Muhammad Rafi'i S.Kom, , Prof. Drs. Jazi Eko Istiyanto, M.Sc, Ph.D.
格式: Theses and Dissertations NonPeerReviewed
出版: [Yogyakarta] : Universitas Gadjah Mada 2014
主題:
ETD
在線閱讀:https://repository.ugm.ac.id/125707/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=65881
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:SMS is currently a need for mobile phone users communicated with others. But cell phone users do not realize that the messages sent can be tapped or altered by unintended parties. That requires a security system in sending SMS messages is cryptography. With limited resources on the mobile phone, then the implementation of symmetric cryptographic technique is suitable to meet the security needs of an SMS message. On symmetric cryptography there is a symmetric key for encryption and decryption. Symmetric key exchange in order to secure the public channel we need a protocol for key exchanges. This research implements the AES symmetric cryptography for encryption and decryption of messages while applying the key exchange protocol Ecliptic Curve Diffie - Hellman (ECDH). This protocol is used to create a shared key that will be used for encryption and decryption of messages. The system is built using the Java programming language based ADK (Android Development Tools). Based on testing of the system indicates that the system can function well and both the encryption algorithm can be implemented for SMS on mobile phones based on Android. In the research found that the length of the message to be increased as much as n state multiplied by 4/3 and can be kept confidential, and authentication.