- I Putu Warma Putra Mahasiswa Pasca Sarjana
- Made Sudarma Universitas Udayana
- Nyoman Pramaita Universitas Udayana
One of the facilities provided by cellular phones is to send data in the form of short messages via Short Message Service (SMS). Most people use SMS services more often than phone services because they are cheap and easy to use. Open networks, easy access, standard platform and open source development bring security threats such as viruses, phishing, spam on SMS.
Security information in SMS can be done by encrypting messages to be sent. The AES (Advanced Encryption Standard) algorithm is a standard for data encryption, suitable for scenarios where memory and processing capabilities are very limited as in mobile devices. Encryption for text data types can also use the Blowfish algorithm, where the Blowfish algorithm can perform encryption and decryption with better performance compared to other symmetric algorithms if packet data size changes.
Research designing systems that can be utilized by users who want to send a confidential information to someone via SMS without fear of information from the message will be known by others. The method used by the system in encrypt and decrypt the message is AES method and Blowfish Cipher which implementation using java programming language on Android.
. Wadhaval Ashish, Rugved Mehta dan Ashlesha Gawade. “Mobile Commerce and Related Mobile Security Issues”. International Journal of Engineering Trends and Technology (IJETT). Vol 4. Issue 4. 2013.
. Gudimetla, Sai Dharma Reddy, Buddharaju Shanmukh Varma, Sai Raghukanth Reddy Gudimetla “A Secure Protocol for M-commerce Secure SMS Mobile Payment”. International Journal of Science Engineering and Advance Technology, IJSEAT, Vol. 4, Issue 4. 2016.
. S.Jyothirmai, J. Lingaiah, M.Raviteta.. “Design and Implementation of an SMS Based Home Security System”. International Journal of Innovative Technologies Volume.04, Issue No.17. 2016.
. Ruby, Beulah PW, S.Abinashrajasingh, N.Ganeshprasad, “GSM Based Vehicle Theft Control System”. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 7 Issue 4, 2018.
. Bo Li dan Gyu Im.. “Smartphone Promising Battlefield for Hackers”. Journal of Security Engineering Vol 8 No.1. 2011
. Sharad Kumar Verma dan Dr. D.B. Ojha.. “An Approach To Enhance The Mobile Sms Security”. Journal of Global Research in Computer Science. Vol 5, No. 5. 2014.
. Nishika dan Rahul Kumar Yadav. “A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment”. International Journal of Computer Science and Mobile Computing Vol. 2,Issue 6. 2013.
. Patil Anjali dan Rajeshwari Goudar. “Sensitive Data Storage in Wireless Devices Using AES Algorithm”. International Journal Of Engineering And Computer Science. Volume 2 Issue 9. 2013.
. Nivedita Bisht dan Sapna Singh.. “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms”. International Journal of Innovative Research in Science Engineering and Technology Vol. 4 Issue 3. 2015.
. Ezeofor C. J. dan Ulasi A. G. “Analysis of Network Data Encryption & Decryption Techniques in Communication Systems”. International Journal of Innovative Research in Science, Engineering and Technology. Vol. 3, Issue 12. 2014.
. Ratna Kumari, U.V, Santosh Pokhrel, dan Hyndavi Anusha Anche. “Blowfish Algorithm-Securing The Future”. Journal of The International Association of Advanced Technology and Science. Vol. 1. 2015
. Sravana Kumar D, P. Sirisha dan CH Suneetha.. “Cascade Block Cipher Using Braiding/Entanglement Of Spin Matrices And Bit Rotation”. International Journal of Network Security & Its Applications (IJNSA). Vol.8, No.2. 2016.
. Shital D.Rautkar dan Dr. Prakash S. Prasad. “An Overview of Real Time Secure SMS Transmission”. International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 1. 2015.
. Simar Preet Singh, dan Raman Maini.. “Comparison Of Data Encryption Algorithms”. International Journal of Computer Science and Communication. Vol. 2, No. 1. 2011.
. Safaat. H, Nazruddin Pemrograman Aplikasi Mobile Smartphone dan Tablet PC Berbasis Android. Bandung: Informatika Bandung. 2011.
- EndNote – EndNote format (Macintosh & Windows)
- ProCite – RIS format (Macintosh & Windows)
- Reference Manager – RIS format (Windows only)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License
Terakhir Di Perbaharui Pada