Use of Rc4 Method In Android-Based Sms Security Application

Authors

  • Oktovantua Butarbutar STMIK Jakarta STI&K

DOI:

https://doi.org/10.54209/infosains.v11i2.41

Keywords:

Information System, Cryptography, RC4

Abstract

. In maintaining the confidentiality of SMS, it takes a way to secure information that is important or confidential, namely by encrypting the SMS text, the level of information security of the message can be increased. One way to use for data and or information security is to use cryptographic system, this application uses RC4 algorithm which has the advantage of having a high level of security and speed process. This makes RC4 the best choice for the encryption process required by the information world towards the next century. The purpose ofbya is to prevent the occurrence of information / data taker without being known by the owner.

Downloads

Download data is not yet available.

References

S. K. Fatima, S. G. Fatima, S. A. Sattar, and A. Sheela, “An advanced data security method in WSN,” Int. J. Adv. Res. Eng. Technol., vol. 10, no. 2, 2019, doi: 10.34218/IJARET.10.2.2019.026.

S. Pirbhulal, O. W. Samuel, W. Wu, A. K. Sangaiah, and G. Li, “A joint resource-aware and medical data security framework for wearable healthcare systems,” Futur. Gener. Comput. Syst., vol. 95, 2019, doi: 10.1016/j.future.2019.01.008.

R. Perangin-angin, I. K. Jaya, and ..., “Analisa Alokasi Memori dan Kecepatan Kriptograpi Simetris Dalam Enkripsi dan Dekripsi,” J. Inf. …, 2019.

A. I. Sallam, O. S. Faragallah, and E. S. M. El-Rabaie, “HEVC Selective Encryption Using RC6 Block Cipher Technique,” IEEE Trans. Multimed., vol. 20, no. 7, 2018, doi: 10.1109/TMM.2017.2777470.

A. I. Sallam, E. S. M. El-Rabaie, and O. S. Faragallah, “CABAC-based selective encryption for HEVC using RC6 in different operation modes,” Multimed. Tools Appl., vol. 77, no. 21, 2018, doi: 10.1007/s11042-018-5994-5.

A. Subandi, M. S. Lydia, R. W. Sembiring, M. Zarlis, and S. Efendi, “Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process,” in IOP Conference Series: Materials Science and Engineering, 2018, vol. 420, no. 1, doi: 10.1088/1757-899X/420/1/012119.

A. Ouertani et al., “Two new secreted proteases generate a casein-derived antimicrobial peptide in Bacillus cereus food born isolate leading to bacterial competition in milk,” Front. Microbiol., vol. 9, no. JUN, 2018, doi: 10.3389/fmicb.2018.01148.

Saranya et al., “Spritz — a spongy RC4-like stream cipher and hash function,” IOP Conf. Ser. Mater. Sci. Eng., vol. 3, no. 3, 2018.

Rusmala and D. Prasti, “Implementasi Metode Rail Fence Chiper dan Row Transposition Chiper Pada Mata Kuliah Kriptograpi,” Ilm. d’Computare, vol. 9, 2019.

A. Hidayat, K. A. Azhari, and D. Setiana, “Perbandingan Penggunaan Memory Dan Cpu Menggunakan Kriptograpi AES,” JUTEKIN (Jurnal Tek. Inform., vol. 6, no. 2, 2018.

Downloads

Published

2021-09-01

How to Cite

Butarbutar, O. . (2021). Use of Rc4 Method In Android-Based Sms Security Application. Jurnal Info Sains : Informatika Dan Sains, 11(2), 5–12. https://doi.org/10.54209/infosains.v11i2.41