scholarly journals Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android

2016 ◽  
Vol 4 (3) ◽  
pp. 450
Author(s):  
Widi Puji Atmojo ◽  
R. Rizal Isnanto ◽  
Rinta Kridalukmana

Security is a very important aspect in data communication. In the last decade, there was a rapid development in mobile phone technology. Smartphone have been equipped with various features and one of them is the short message service (SMS). However, messages sent via mobile phone networks pose threat to be accessed by people who do not have any authorization. Therefore, it is necessary to do research on the development of software to enhance the security of messages through message encryption and decryption features. This application uses Java programming language with SDK (Software Development Kit) Android and Android Studio 1.3.1 as an editor. The initial step of this research is to encrypt the original message to produce the ciphertext message. The second step is to decrypt ciphertext incoming messages to become genuine message. Results from this research are an Android-based application that can perform encryption and decryption of the SMS messages using the RC6 algorithm. With the application of cryptography for SMS messages, the expected level of information security of the message can be improved so that the message will be more secure from unauthorized access.

2020 ◽  
Vol 4 (2) ◽  
pp. 69-80
Author(s):  
Mohamed Ibrahim Eymoi ◽  
Patrick Mbataru

The unprecedented global adoption of information and communication technologies (ICTs) is rapidly changing the way people are communicating in solving problems. For several years now, the role of ICTs has become important in the way people construct their relationships in conflict resolution. Yet little is known on the dynamism of this interaction. It is not clear how mobile technology has contributed toward conflict resolution, and this study will contribute to the knowledge on the role of mobile telephones in conflict resolution. The purpose of this study was to explore how the mobile phone technology contributed in resolving communal conflicts in Mandera County, Kenya. This study was guided by three theories: conflict transformation theory, diffusion of innovations theory and social representation theory. The conflict Tansformation Theory is adopted as the main theory of analysis.  The main idea of this theory is transforming negative conflict into constructive conflict, deals with structural, behavioural and attitudinal aspects of conflict. This study adopted a descriptive survey. The population for this study consisted of 301 employees in ICT and security department where stakeholders in technology and security sectors and the public. Primary and secondary  data was analysed according to the objectives. Primary data was derived from questionnaires formulated to target employees in ICT and security department. The data analysis included qualitative and quantitative techniques.  Qualitative data was summarized and categorized according to common themes and was presented using frequency distribution tables, graphs and charts. Content analysis was used mostly to arrive at inferences through a systematic and objective identification of the specific messages. The quantitative data collected was analyzed using descriptive statistics. The results confirmed that short message service, social media plateform, instant messaging applications, and video conferencing play a role in resolving communal conflicts in Mandera County. The study concludes that Short Message Service, Social Media Platforms and Instant Messaging Applications can be used conflict such as communal conflicts. Video Conferencing can be used to solve conflict such as relationship conflict, arises from differences in personality, style, matters of taste, and even conflict style as well as conflict in the workplace like task conflict. County government of Mandera must come up with ways of incorporating mobile phone technologies such as Short Message Service, Social Media Platforms, Instant Messaging and Video Conferencing on matters conflict resolution. The study recommends that the County Government of Mandera in collaboration with the National Government need to come up with agencies to regulate the use of social media as a medium to communicate in times of conflict since they are sometimes prone to misuse.


2018 ◽  
Author(s):  
Rivalri Kristianto Hondro

Kemajuan perkembangan teknologi komputer dan telekomunikasi dapat membantu menyelesaikan pekerjaan dengan cepat, akurat dan efisien. Alat komunikasi yang banyak digunakan pada saat ini adalah mobile phone atau disebut juga telepon seluler. Salah satu teknologi yang digunakan untuk berkomunikasi pada mobile phone adalah dengan mengirimkan data berupa pesan singkat atau SMS (Short Message Service). Permasalahan yang ditemukan dalam berkomunikasi menggunakan mobile phone adalah pencurian, penyadapan, atau penghapusan data khususnya data SMS (Short Message Service) sehingga aspek keamanan data dianggap penting. Oleh karena itu dibutuhkan sistem kriptografi enkripsi dan dekripsi SMS, disini digunakan enkripsi simetris. Sistem ini merupakan aplikasi yang menerapkan metode zig zag cipher yang menggunakan kunci simtetris. Hasil pengujian dari sistem ini adalah pesan SMS dienkripsi dengan pola zig zag menggunakan kunci dan didekripsi menggunakan kunci yang sama dengan enkripsi.


2020 ◽  
Vol 7 (3) ◽  
pp. 398
Author(s):  
Nurainun Hasanah Sinaga ◽  
Muhammad Syahrizal

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS


Author(s):  
Mahmud Akhter Shareef ◽  
Jashim Uddin Ahmed ◽  
Vinod Kumar ◽  
Uma Kumar

This chapter is engaged in identifying consumer perceptions regarding short message service (SMS) of the mobile phone as an alternative service delivery channel for Mobile-health (M-health) and studying the cultural impact of this change. In this connection, the Unified Theory of Acceptance and Use of Technology (UTAUT) model was used as the theoretical base to perceive consumer perceptions about M-health. The authors have performed an empirical study of diabetic patients in Bangladesh and Canada. Path analysis was conducted on the results of both samples. Analysis results confirmed that the UTAUT model fits quite nicely in predicting consumer perceptions of M-health-driven mobile technology. It also acknowledged that differences in cultural traits have an impact on consumer behavior.


Author(s):  
Adams B. Bodomo

In the last chapter, I concentrated mainly on mobile phone voice communication. In this chapter, I will focus on mobile phone text communication. Mobile phone texting or communication through short message service (SMS) started slowly, as we saw in chapter 6, but has quickly emerged as a frequent daily linguistic, literacy or general communicative practice in which two or more people exchange messages by coding and decoding texts received and sent from their cell phones. Mobile phone texting is almost now as pervasive and as ubiquitous as mobile phone voice communication, if not more among some segments of users like young people. This communication process can be witnessed in buses, at homes, in offices, in restaurants, out in the woods, on the high seas, and even in the air! Hong Kong’s main English language newspaper, the South China Morning Post (SCMP) edition of April 11, 2004 indicates that as huge a volume of 200 million SMS messages are exchanged monthly. SMS has become a multi-million dollar business for service providers.


2019 ◽  
Vol 19 (1) ◽  
Author(s):  
Aliyu Mohammed ◽  
Princess Ruhama Acheampong ◽  
Easmon Otupiri ◽  
Francis Adjei Osei ◽  
Roderick Larson-Reindorf ◽  
...  

2002 ◽  
Vol 14 (03) ◽  
pp. 109-114 ◽  
Author(s):  
REN-GUEY LEE ◽  
KUANG-CHIUNG CHANG

This paper presents an SMS based design in the GSM system for a portable, light weighted, and small sized TeleAlarm device. The device is composed of a transmitter and a controller. When an emergent situation such as a stroke or a fall occurs, the user only needs to push a button to trigger the controller. The controller automatically sends text messages stored in its database through the transmitter to specified mobile phone numbers for help. The SMS uses only the control channels in the GSM system to transfer the message, which enables the receiving-end user to receive it even during a call. An experimental test shows that a complete message transmission only needs 2.949 seconds in average. The design is convenient to elderly people who may live alone.


Sign in / Sign up

Export Citation Format

Share Document