scholarly journals Implementasi Algoritma Mars Pada Pengamanan SMS

2020 ◽  
Vol 7 (3) ◽  
pp. 398
Author(s):  
Nurainun Hasanah Sinaga ◽  
Muhammad Syahrizal

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Mesran Mesran

Data is the essential thing in the world of communication. Text messaging is a way of communicating that is sent in digital form. This message is very widely used in electronic media such as short message service. This message was sent through the service provider. Messages sent are unsafe and can be intercepted at the time of submission. Message delivery needs to apply cryptographic algorithms to text messages sent using encryption and decryption techniques. Super Playfair cipher and two square cipher algorithms are a development of Playfair cipher method. This method is a quite complicated way of solving it than other classical methods. These methods belong to classical cryptographic algorithms that use substitution encoding techniques and character transitions that use a symmetric key in the process of encryption and decryption.


2002 ◽  
Vol 14 (03) ◽  
pp. 109-114 ◽  
Author(s):  
REN-GUEY LEE ◽  
KUANG-CHIUNG CHANG

This paper presents an SMS based design in the GSM system for a portable, light weighted, and small sized TeleAlarm device. The device is composed of a transmitter and a controller. When an emergent situation such as a stroke or a fall occurs, the user only needs to push a button to trigger the controller. The controller automatically sends text messages stored in its database through the transmitter to specified mobile phone numbers for help. The SMS uses only the control channels in the GSM system to transfer the message, which enables the receiving-end user to receive it even during a call. An experimental test shows that a complete message transmission only needs 2.949 seconds in average. The design is convenient to elderly people who may live alone.


2013 ◽  
Vol 24 (02) ◽  
pp. 1350002 ◽  
Author(s):  
JOSEPHINE JILL T. CABATBAT ◽  
GIOVANNI A. TAPANG

We identify the different styles of texting in Filipino short message service (SMS) texts and analyze the change in unigram and bigram frequencies due to these styles. Style preference vectors for sample texts were calculated and used to identify the style combination used by an average individual. The change in Shannon entropy of the SMS text is explained in light of a coding process.


2011 ◽  
pp. 179-202
Author(s):  
Maizatul A. Ismail ◽  
Rafidah Md-Noor ◽  
Mazliza Othman

The use of short message service (SMS) has grown tremendously in the past few years. Billions of users use this service to send text messages. Various applications have been introduced by service providers, e.g., mobile banking, summons checkpoint, SMS chat, etc., all of which have become a huge success. This chapter gives an overview of how this service is provided and discusses various SMS applications offered to the user. We explore the reasons behind its success and the issues that must be addressed to provide these applications. We also examine future trends and the challenges that must be overcome in order to enhance this service. We hope that this chapter gives a better understanding of how SMS applications are provided and what may be expected in future applications given the enhancement on the current SMS and technology advancement.


Pragmatics ◽  
2009 ◽  
Vol 19 (3) ◽  
pp. 393-412 ◽  
Author(s):  
Tereza Spilioti

The aim of this study is to investigate the choice of alphabetical encoding in Greek text-messaging (or Short Message Service, SMS). The analysis will be based on a corpus of 447 text-messages exchanged among participants who belong to the age group of ‘youth’ (15-25 years old) and live in Athens (Greece). The data analysis will show that the standard practice of writing with Greek characters represents the norm in Greek SMS. The script norm will be discussed in relation to the medium’s technological affordances and the participants’ stance towards new media. The analysis will then focus on non-standard graphemic choices, such as the use of both, Greek and Roman, alphabets in the encoding of single messages. It will be demonstrated that such marked choices are employed as a means of indexing the participants’ affiliation with global popular cultures and enhancing expressivity in a medium of reduced paralinguistic cues.


2017 ◽  
Vol 8 (2) ◽  
Author(s):  
Sugiyanto Sugiyanto ◽  
Rinci Kembang Hapsari

Short Message Service (SMS) is working on a wireless network that allows the theft of the message contents. There are risks that could threaten the security of the contents of the message on SMS services, including SMS snooping, and SMS interception. Therefore, it takes security system messages on SMS services to maintain the security and integrity of the message content to cover the security messages. Algorithms Advanced Encryption Standard (AES) using a structure SPN (Substitution Permutation Network) structure, which has the disadvantage of encryption and decryption, so the safety level is low. To cover the security hole of these weaknesses, the researchers conducted the improvement of Advanced Encryption Standard (AES) algorithm security system based on android SMS using Vigenere algorithm, so that the level of security and integrity of the content of the short message becomes higher and difficult to solve. The results showed an average increase in percentage value of the avalanche effect from 37.24% to 42.96%. Keywords—Advanced Encryption Standard, android, message security, encryption.


2011 ◽  
Vol 1 (2) ◽  
pp. 145-162
Author(s):  
Raluca Moise

Abstract Starting from the ostentatious presence of the SMS for teenagers, I attempted to identify the values of its appropriation process and to outline the trajectory of SMS within teenage culture. My argument is that the SMS develops two interpenetrating usage trajectories: an individual and a collective line, the later bearing a marked cultural logic. The relation between the object of consumption and the individual is framed by specific values of usage and regulated by cultural practices. In this article, I will present the factors that regulate the individual usage of the SMS, incorporating this form of communication in teens’ universe. Through ethnographic fieldwork in Romania, I have carried out participant observation and interviews in places that are frequented by teenagers and I have collected and analyzed more than 300 text messages, written by teenagers in daily personal journals of communication.


2017 ◽  
Vol 23 (6) ◽  
pp. 905-927 ◽  
Author(s):  
CHRIS GIANNELLA ◽  
RANSOM WINDER ◽  
STACY PETERSEN

AbstractIn written Chinese, personal pronouns are commonly dropped when they can be inferred from context. This practice is particularly common in informal genres like Short Message Service messages sent via cell phones. Restoring dropped personal pronouns can be a useful preprocessing step for information extraction. Dropped personal pronoun recovery can be divided into two subtasks: (1) detecting dropped personal pronoun slots and (2) determining the identity of the pronoun for each slot. We address a simpler version of restoring dropped personal pronouns wherein only the person numbers are identified. After applying a word segmenter, we used a linear-chain conditional random field to predict which words were at the start of an independent clause. Then, using the independent clause start information, as well as lexical and syntactic information, we applied a conditional random field or a maximum-entropy classifier to predict whether a dropped personal pronoun immediately preceded each word and, if so, the person number of the dropped pronoun. We conducted a series of experiments using a manually annotated corpus of Chinese Short Message Service. Our approaches substantially outperformed a rule-based approach based partially on rules developed by Chung and Gildea (2010, Effects of Empty Categories on Machine Translation.Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics. pp. 636–45). Our approaches also outperformed (though by a considerably smaller margin) a machine-learning approach based closely on work by Yang, Liu, and Xue in (2015, Recovering Dropped Pronouns from Chinese Text Messages.Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics (ACL). Association for Computational Linguistics. pp. 309–13). Features derived from parsing largely did not help our approaches. We conclude that, given independent clause start information, the parse information we used was largely superfluous for identifying dropped personal pronouns.


Sign in / Sign up

Export Citation Format

Share Document