Android smartphones are very popular today because it is rich in features, ranging from multimedia, gaming applications also practically very varied, but behind a myriad of features android smartphone still has some of the same functionality as a regular phone, and it arguably can not be separated because it is basic functions of a mobile phone, one of which is a feature of the Short Message Service (SMS) which serves to send and receive short messages. function default SMS application is still frequently used, in this thesis the author makes SMS encryption application, it is intended that the contents of confidential messages can be delivered safely without having to worry about the content of the message is known by others. Methods for securing the contents of the message that is using encryption methods. Encryption is a process of converting an original message (plaintext) into a special code that can not be read and unintelligible (ciphertext), the message isthe one that will be sent by SMS to the sender using the key, and to be able to read or restore contents of the messages that have been encrypted need a decryption process, the process is carried out by the SMS recipient by entering the same key with a key that is used by the sender. This method is also called Symmetric Algorithms, the algorithm uses the same key for both encryption and decryption process
Peer Review Implementasi Aplikasi Enkripsi Short Message Service (Sms) Berbasis Android
jurnal Implementasi Aplikasi Enkripsi Short Message Service (Sms) Berbasis Android
[1] Antonopoulous, Nick & Lee Gillam. 2010. Cloud Computing – Principles, Systems and Applications. United Kingdom: Springer. [2] Chee, Brian J.S. & Curtis Franklin, Jr. 2010. Cloud Computing – Technologies and Strategies of the Ubiquitous Data Center. New York: CRC Press. [3] Goyal, Amit, Sara Dadizadeh. 2009. A Survey on Cloud Computing. Journal of Computer Science. University of British Columbia, p.1-14. [4] Krautheim, F. John. 2009. Private Virtual Infrastructure for Cloud Computing. Journal of Univ. of Maryland, p.1-5. [5] Mather, Tim, Subra Kumaraswamy, Shahed Latif. 2009. Cloud Security and Privacy – An Enterprise Perspective on Risks and Compliance. USA: O’Reilly Media, Inc. [6] Morsy, Mohamed Al, John Grundy, Ingo Muller. 2010. An Analysis of Cloud Computing Security Problem. Proceeding of APSEC 2010 Cloud Workshop, Australia, p.1-6. [7] Pierce, Marlon E., Geoffrey C. Fox, Yu Ma, Jun Wang. 2009. Cloud Computing and Spatial Cyberinfrastructure. Journal of Computer Science of Indiana University, p. 1-21. [8] Rittinghouse, John W., James F. Ransome. 2010. Cloud Computing – Implementation, Management, and Security. USA: CRC Press. [9] Velte, Anthony T., Toby J. Velte, Robert Elsenpeter. Cloud Computing – A Practical Approach. USA: Mc Graw Hill