Message Security Application Using Mobile-Based AES Algorithm

Mhd Ikhsan Rifki, Nanda Syamia

Abstract


All information in data exchange transactions on communication networks travels through the network infrastructure. The network infrastructure sends various types of data, including text, images, and documents with various extensions. These documents may be private and confidential. Therefore, it is crucial to have a message security option that is not only user-friendly but also has a high level of security system complexity. The purpose of this research is to build a text message security system using the Advanced Encryption Standard (AES) algorithm on mobile devices. We can utilize it as a security solution to safeguard text messages received through mobile devices. The AES security algorithm is known to have reliability in processing data encryption and decryption. The research will describe components such as the design, implementation, and analysis of application requirements. Important features include encryption, decryption, and key management in addition to an easy-to-use UI. The research findings show that this program successfully secures text messages while maintaining the confidentiality and integrity of the data sent. Additionally, we adjusted the application's parameters to align with mobile device standards, ensuring consistent encryption and decryption procedures that users can easily operate. For application testing, we use the black box testing method to ensure that the design and application function as intended, adhere to security regulations, and provide a positive user experience. This study's results suggest that AES-based mobile messaging security applications can serve as a tool to fulfill the secure communication expectations of mobile users.


Keywords


AES, Applications, Mobile, Text Data, Security

Full Text:

PDF

References


Andri, R. H., & Sitanggang, D. P. (2023). Sistem Penunjang Keputusan (SPK) Pemilihan Supplier Terbaik Dengan Metode MOORA. Jurnal Sains Informatika Terapan, 2(3), 79–84.

Balli, F., & Banik, S. (2019). Six shades of AES. Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings 11, 311–329.

Dadkhah, M., Lagzian, M., & Santoro, G. (2019). How can health professionals contribute to the internet of things body of knowledge: A phenomenography study. VINE Journal of Information and Knowledge Management Systems, 49(2), 229–240. https://doi.org/10.1108/VJIKMS-10-2018-0091

Freyre, P., Cuellar, O., Díaz, N., & Alfonso, A. (2020). From AES to Dynamic AES. Journal of Science and Technology on Information Security, 1(11), 11–22.

Kaffah, F. M., Gerhana, Y. A., Huda, I. M., Rahman, A., Manaf, K., & Subaeki, B. (2020). E-Mail message encryption using advanced encryption standard (AES) and huffman compression engineering. Proceedings - 2020 6th International Conference on Wireless and Telematics, ICWT 2020. https://doi.org/10.1109/ICWT50448.2020.9243651

Kumar, K., Ramkumar, K. R., & Kaur, A. (2020). A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA. ICRITO 2020 - IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), 182–185. https://doi.org/10.1109/ICRITO48877.2020.9198033

Liu, S., Li, Y., & Jin, Z. (2023). Research on Enhanced AES Algorithm Based on Key Operations. 2023 IEEE 5th International Conference on Civil Aviation Safety and Information Technology (ICCASIT), 318–322. https://doi.org/10.1109/ICCASIT58768.2023.10351719

Lytvyn, V., Peleshchak, I., Peleshchak, R., & Vysotska, V. (2019). Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. 2019 3rd International Conference on Advanced Information and Communications Technologies, AICT 2019 - Proceedings, 447–450. https://doi.org/10.1109/AIACT.2019.8847896

Manullang, S. F., & Allwine, J. S. (2023). Implementasi Kriptografi Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining.

Mohammed, N. Q., Amir, A., Ahmad, B., Salih, M. H., Arrfou, H., Thalji, N., Matem, R., Abbas, J. K. K., Hussien, Q. M., & Abdulhassan, M. M. (2023). A Review on Implementation of AES Algorithm Using Parallelized Architecture on FPGA Platform. 2023 IEEE International Conference on Advanced Systems and Emergent Technologies (IC_ASET), 1–6. https://doi.org/10.1109/IC_ASET58101.2023.10150938

Mukwevho, N., & Chibaya, C. (2020). Dynamic vs Static Encryption Tables in DES Key Schedules. 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC), 1–5.

Mulud Muchamad, R., Asriyanik, A., & Pambudi, A. (2023). Implementasi Algoritma Advanced Encryption Standard (Aes) Untuk Mengenkripsi Datastore Pada Aplikasi Berbasis Android. Jurnal Mnemonic, 6(1), 55–64. https://doi.org/10.36040/mnemonic.v6i1.5889

Nababan, S. A. M., & Setyadi, R. (2022). Pengimplementasian Algoritma RSA Untuk Mengamankan E-mail Menggunakan Outlook dan OpenPGP. Resolusi: Rekayasa Teknik Informatika Dan Informasi, 3(2), 23–28.

Nino, B. E. (2023). Perbandingan performa algoritma aes dan twofish menggunakan metode strict avalanche criterion pada nomor induk kependudukan indonesia. Jurnal Teknologi Informasi, 9(1), 19–29.

Rahman, Z., Hasanuddin, T., & Abdullah, S. M. (2020). Implementasi Metode Enkripsi dan Deskripsi File menggunakan Algoritma Twofish. Buletin Sistem Informasi Dan Teknologi Islam (BUSITI), 1(2), 66–70.

Su, N., Zhang, Y., & Li, M. (2019). Research on data encryption standard based on AES algorithm in internet of things environment. Proceedings of 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2019, Itnec, 2071–2075. https://doi.org/10.1109/ITNEC.2019.8729488

Verma, R., & Sharma, A. K. (2020). Cryptography: Avalanche effect of AES and RSA. International Journal of Scientific and Research Publications, 10(4), 119–122.

Wongkhamdi, T., Cooharojananone, N., & Khlaisang, J. (2020). E-commerce competence assessment mobile application development for SMEs in Thailand. International Journal of Interactive Mobile Technologies, 14(11), 48–75. https://doi.org/10.3991/ijim.v14i11.11358




DOI: https://doi.org/10.30596/jcositte.v5i2.20834

Refbacks

  • There are currently no refbacks.