Implementasi Aplikasi Enkripsi Short Message Service (Sms) Berbasis Android

research
  • 21 Jul
  • 2020

Implementasi Aplikasi Enkripsi Short Message Service (Sms) Berbasis Android

Android smartphones are very popular today because it is rich in features, ranging from multimedia, gaming applications also   practically   very   varied,   but   behind   a  myriad  of   features android  smartphone  still  has  some  of  the  same  functionality  as  a regular  phone,  and  it  arguably  can  not  be  separated  because  it  is basic functions of a mobile phone, one of which is a feature of the Short  Message  Service  (SMS)  which  serves  to  send  and  receive short messages. function default SMS application is still frequently used, in this thesis the author makes SMS encryption application, it is  intended  that  the  contents  of  confidential  messages  can  be delivered  safely  without  having  to  worry  about  the  content  of  the message  is  known  by  others.  Methods  for  securing  the  contents  of the  message  that  is  using  encryption  methods.  Encryption  is  a process of converting an original message (plaintext) into a special code  that  can  not  be  read  and  unintelligible  (ciphertext),  the message isthe one that will be sent by SMS to the sender using the key, and to be able to read or restore contents of the messages that have  been  encrypted  need  a  decryption  process,  the  process  is carried  out  by  the  SMS  recipient  by  entering  the  same  key  with  a key that is used by the sender. This method is also called Symmetric Algorithms,  the  algorithm  uses  the  same  key  for  both  encryption and decryption process

Unduhan

 

REFERENSI

[1] Antonopoulous, Nick & Lee Gillam. 2010. Cloud Computing – Principles, Systems and Applications. United Kingdom: Springer. [2] Chee, Brian J.S. & Curtis Franklin, Jr. 2010. Cloud Computing – Technologies and Strategies of the Ubiquitous Data Center. New York: CRC Press. [3] Goyal, Amit, Sara Dadizadeh. 2009. A Survey on Cloud Computing. Journal of Computer Science. University of British Columbia, p.1-14. [4] Krautheim, F. John. 2009. Private Virtual Infrastructure for Cloud Computing. Journal of Univ. of Maryland, p.1-5. [5] Mather, Tim, Subra Kumaraswamy, Shahed Latif. 2009. Cloud Security and Privacy – An Enterprise Perspective on Risks and Compliance. USA: O’Reilly Media, Inc. [6] Morsy, Mohamed Al, John Grundy, Ingo Muller. 2010. An Analysis of Cloud Computing Security Problem. Proceeding of APSEC 2010 Cloud Workshop, Australia, p.1-6. [7] Pierce, Marlon E., Geoffrey C. Fox, Yu Ma, Jun Wang. 2009. Cloud Computing and Spatial Cyberinfrastructure. Journal of Computer Science of Indiana University, p. 1-21. [8] Rittinghouse, John W., James F. Ransome. 2010. Cloud Computing – Implementation, Management, and Security. USA: CRC Press. [9] Velte, Anthony T., Toby J. Velte, Robert Elsenpeter. Cloud Computing – A Practical Approach. USA: Mc Graw Hill