scholarly journals Android-Based Text Message Security Application With Rivest Method, Shamir, Adleman (RSA)

2019 ◽  
Author(s):  
Ronal Watrianthos

Security is very important in all aspects to protect data. Text messages on mobile phones, which is sms (short messages service) is one of theimportant data that needs a data security system. Data security is used to maintain the confidentiality of important data that we have on mobile devices.The encryption process is used so that messages cannot be read by other unwanted parties. While the decryption process is used so that the messagecan be read back by the intended party. Rivest Cryptography, Shamir, Adleman (RSA) is one of the asymmetric cryptographic algorithms that use a keypair, that is the public key and private key. The key length can be set, where the longer the key formation bit, the harder it is to solve because it is difficultto factor two very large numbers. This study applies the Rivest, Shamir, Adleman (RSA) algorithm for text message security applications based onAndroid. Based on the research that has been done, the author can draw conclusions, namely: Rivest, Shamir, Adleman (RSA) cryptographic algorithmcan be implemented for text message security Android based. So it is safer to exchange text messages (SMS) so that user privacy is guaranteed

2018 ◽  
Vol 10 (2) ◽  
Author(s):  
Yuza Reswan ◽  
Dedy Agung Prabowo

ABSTRACTIt is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties.Keyword : Data Security, Cryptography, Hill Cipher, RSAABSTRAKDi masa sekarang sudah menjadi hal yang biasa bahwa kerahasiaan harus benar – benar ditingkatkan dan diperketat karena menimbang kemunculan teknologi terbaru yang semakin pesat berkembang. Tentu sebuah Instansi, kelompok, ataupun individu memiliki data yang bersifat rahasia dan tidak ingin diketahui oleh pihak lain maka dari itu diperlukannya system yang mampu mengamankan data tersebut. Untuk itulah penelitian ini bertujuan membuat aplikasi Kriptografi dengan menerapkan kombinasi Algoritma Hill Cipher dan RSA, Kriptografi juga disebut bahasa persandian dan saya menerapkan Hill Cipher karena merupakan metode klasik yang menggunakan perkalian untuk tiap karakter yang disandikan sedangkan RSA adalah metode modern yang memiliki 2 kunci yaitu kunci publik dan kunci rahasia dimana kunci publik digunakan untuk penyandian dan kunci rahasia untuk menterjemahkan kembali k bentuk asli. Dengan menerapkan kombinasi metode klasik dan modern ini dapat lebih mengamankan sehingga lebih sulit untuk dapat di pecahkan oleh pihak – pihak yang tidak diinginkan.Kata Kunci : Pengamanan Data, Kriptografi, Hill Cipher, RSA.


Any type of digital information is called as data. In today's world, precarious data are growing and used in communication over internet. Hence, data security is most important factor for the internet users. The best solution is to use some cryptography algorithms which encrypts data in some cipher and transmit it over the internet and again decrypted to genuine data. Cryptography is eternal. The field of cryptography manages the technique for passing on information safely. The objective is to permit the expected recipients to get the message appropriately while interfere with snoopers from understanding the message. Key arrangement layout allows communicating parties to establish a mutual cipher key. The situation of present day of data security framework incorporates secrecy, legitimacy, trustworthiness, non-repudiation. This paper introduces a improved system for securing text-data communication benefiting the use of RSA algorithm. It is the public-key cryptosystem and is mainly used for secure data transmission[1].


2017 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Muhammad Yasin Simargolang

Abstract - Cryptography is an art and science to maintain data security. In maintaining the security of cryptographic data transforming clear data (plaintext) into a password (ciphertext) that cannot be recognized. This ciphertext is then sent by the sender to the recipient. After arriving at the recipient, the ciphertext is transformed back into a plaintext form so that it can be recognized. The method used is the encryption method asymmetrical Rivest Shamir Adleman (RSA). The security of the RSA algorithm lies in the difficulty of factoring large numbers into prime factors. Factoring is done to obtain a private key. Making this application using the PHP programming language. The final result is a desktop-based application that can be used to encrypt text files. This application can be used as a way to secure data, because only authorized people can view encrypted data. Keywords - Cryptography, RSA, Encryption - Decryption, Text, PHP


Author(s):  
Er. Vishal Chauhan ◽  
Dr. Chandresh Parekh ◽  
Prof. Vivek Joshi

Authentication, Authorization, security and confidential information are number of foremost topics part in the Digital cyber - security Area. There are multiple solutions available in this virtualize cyber world that are presented to user’s strength as per digital security. Username and password base are common factor authentication methods. The growing-up popularity with compliance of second factorized methods those driven by the improvement of privacy and security as per the requirement during this digitalization of technological trend. The recognition and success of digital security various measures are big deal to obsessed with simple convenience. Its need more and more implementation for the user privacy, data confidentiality and network security’s system. mainly focus on this research Article into dealing with and analysing the implications of security part of 3FA proposal model for additional security in way of systematic manner to improvements of digital security in web-based Application. This paper will be presenting as web-based Application. so, we can create potentially ensure systems are authorized with authentication of user's assurance without loss of convenience between user-system data communication in network.


Author(s):  
Jonathon Keats

The big news in the Twitterverse on October 19, 2009, was the sighting of the pentagigatweet. Sent by an out-of-work dotcom executive named Robin Sloan, the six-character text message, a bit of banter between friends, garnered more attention than the war in Afghanistan or the swine flu pandemic. “Oh lord,” it read. The message was sent at 10:28 a.m. PST. By 3:47 p.m. a CNET news story proclaimed, “Twitter hits 5 billion tweets,” quoting Sloan’s two-word contribution to telecommunications history, and noting that he’d geekily dubbed it the pentagigatweet. The following day newspapers around the world, from the Telegraph in England to Il Messagero in Italy, had picked up the story, yet the most extensive coverage was on Twitter itself, where nearly 30 percent of the estimated 25 million daily messages referenced the benchmark. The numbers were impressive. But more remarkable than the level of popularity achieved in the mere thirty-eight months since the microblogging service launched in 2006 was the degree to which those who used it felt responsible for building it. The megatweeting greeting the pentagigatweet was a sort of collective, networked navel-gazing. In the days following the five billionth text message Twitter was atwitter with self-congratulation. That sense of personal investment, essential to Twitter’s growth, was entirely by design. As Jack Dorsey explained in an interview with the Los Angeles Times about the company he cofounded, “The concept is so simple and so open-ended that people can make of it whatever they wish.” Dorsey based the service on his experience writing dispatch software and his insight that the best way to observe a city in real time was to monitor the dispatches coming from couriers and taxis and ambulances. Twitter was created to put that experience in the hands of ordinary citizens, literally, by asking people to periodically send in text messages by mobile phone answering the question “What are you doing?” All participants would be able to follow the stream of responses. In other words, Twitter was formulated as a sort of relay, utterly dependent on the public for content.


Crisis ◽  
2010 ◽  
Vol 31 (2) ◽  
pp. 109-112 ◽  
Author(s):  
Hui Chen ◽  
Brian L. Mishara ◽  
Xiao Xian Liu

Background: In China, where follow-up with hospitalized attempters is generally lacking, there is a great need for inexpensive and effective means of maintaining contact and decreasing recidivism. Aims: Our objective was to test whether mobile telephone message contacts after discharge would be feasible and acceptable to suicide attempters in China. Methods: Fifteen participants were recruited from suicide attempters seen in the Emergency Department in Wuhan, China, to participate in a pilot study to receive mobile telephone messages after discharge. All participants have access to a mobile telephone, and there is no charge for the user to receive text messages. Results: Most participants (12) considered the text message contacts an acceptable and useful form of help and would like to continue to receive them for a longer period of time. Conclusions: This suggests that, as a low-cost and quick method of intervention in areas where more intensive follow-up is not practical or available, telephone messages contacts are accessible, feasible, and acceptable to suicide attempters. We hope that this will inspire future research on regular and long-term message interventions to prevent recidivism in suicide attempters.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2019 ◽  
Author(s):  
Megan Partch ◽  
Cass Dykeman

Mental health treatment providers seek high-impact and low-cost means of engaging clients in care. As such, text messaging is becoming more frequently utilized as a means of communication between provider and client. Research demonstrates that text message interventions increase treatment session attendance, decrease symptomology, and improve overall functioning. However, research is lacking related to the linguistic make up of provider communications. Text messages were collected from previously published articles related to the treatment of mental health disorders. A corpus of 39 mental health treatment text message interventions was composed totaling 286 words. Using Linguistic Inquiry and Word Count (LIWC) software, messages were analyzed for prevalence of terminology thought to enhance client engagement. Clout, demonstrating the writer’s confidence and expertise, and positive Emotional Tone were found to be at a high level within the corpus. Results demonstrated statistical significance for five linguistic variables. When compared with national blog norms derived from Twitter, Clout, Emotional Tone, and use of Biological terminology were found to be at higher rates than expected. Authenticity and Informal terminology were found at significantly lesser rates.


2020 ◽  
Author(s):  
Stephanie Craig Rushing ◽  
Allyson Kelley ◽  
Sheana Bull ◽  
David Stephens ◽  
Julia Wrobel ◽  
...  

BACKGROUND Culturally-relevant interventions are needed to help American Indian and Alaska Native (AI/AN) teens and young adults navigate common risky situations involving family and friends, including drug and alcohol misuse, dating violence, and suicidality. We R Native – a multimedia health resource for Native teens and young adults – designed an intervention for Native youth, delivered via text message, that includes role model videos, mental wellness strategies, and links to culturally-relevant resources (hotlines, chat-lines, websites, etc.) and social support. OBJECTIVE This study aims to test the efficacy of BRAVE to improve participant’s physical, mental, and spiritual health, their use of mental wellness strategies, their help-seeking skills, and associated factors, including cultural resilience, identity, and cultural pride. METHODS The randomized controlled trial was carried out by the Northwest Portland Area Indian Health Board and the mHealth Impact Lab. The team recruited 2,334 AI/AN teens and young adults nationwide (15-24 years old) via social media channels and text message and enrolled 1,044 to participate. AI/AN teens and young adults enrolled in the study received either: 8 weeks of BRAVE text messages designed to improve mental health, help-seeking skills, and cultural resilience; or 8 weeks of STEM text messages, designed to elevate and re-affirm Native voices in science, technology, engineering, math and medicine (STEM); and then received the other set of messages. Primary and secondary outcomes were tested using linear mixed-effect models and linear regressions. RESULTS A total of 833 AI/AN teens and young adults were included in the analysis. Individuals in the BRAVE and STEM arms showed significant positive trends over the course of the study for all primary outcomes except cultural identity and help seeking behavior. Mean scores were significantly different for health (P<.001), resilience (P<.001), negative coping (P=.027), positive coping (P<.001), self-efficacy (P=.021), and self-esteem (P<.001). Changes in help-seeking self-efficacy were significant for those exhibiting risky behavior at baseline to exit (P=.01). Those who reported positive coping scores at baseline also reported better health on average, but no difference in risky drug and alcohol use (P<.001). The number of participants that used text messages to help themselves increased from 69% at 3-months (427/618) to 75% at 8-months (381/501) (P<.001). Similarly, the number of participants that used text messages to help a friend or family member increased from 22% at 3-months (138/616) to 55% at 8-months (272/498). CONCLUSIONS This is the first nationwide randomized controlled trial for AI/AN teens and young adults to test the efficacy of an mHealth intervention on mental wellness. The findings suggest that culturally-relevant multimedia, mHealth interventions can improve help-seeking behavior. Lessons learned from this study may help other AI/AN-serving organizations, prevention programs, policymakers, researchers, and educators as they support the next generation of AI/AN change-makers.


Sign in / Sign up

Export Citation Format

Share Document