scholarly journals Cryptography with Layered Algorithms for Text Security on Android

Author(s):  
Ery Safrianti ◽  
Fernanda Fitriansyah

Android phone is one of the most widely used telecommunications devices today. The exchange of various forms of information ranging from text, sound, images and video through this media is inseparable from the threat of criminal crime through digital data theft. Data security aspects are very important to be considered, one of which is data in the form of text. Text data is commonly used in short message services (SMS), chat in various Android applications or in the use of logins and passwords. This research will create an application on Android for securing text data through cryptographic techniques with a layered algorithm using three types of algorithms namely Caesar, Blowfish and AES Algorithms (Advanced Standard Encryption). This application can run on Android 5.0 (lollipop) or above, which can be used to encrypt and decrypt text messages. The test results show that the results of the initial text that was encoded through the encryption process can be safely returned by the decryption process without the slightest mistake with the original text.  The encryption test for capital letters, numbers, and punctuation can be completely decrypted.

2020 ◽  
Vol 7 (3) ◽  
pp. 398
Author(s):  
Nurainun Hasanah Sinaga ◽  
Muhammad Syahrizal

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


Sexual Health ◽  
2013 ◽  
Vol 10 (1) ◽  
pp. 91 ◽  
Author(s):  
Lynne Martin ◽  
Vickie Knight ◽  
Phillip J. Read ◽  
Anna McNulty

Given the documented benefits of using text messaging (short message service; SMS), the internet and email to deliver sexually transmissible infection (STI) test results, including high acceptability among clients, Sydney Sexual Health Centre (SSHC) aimed to identify which methods our clients preferred for receiving their results, using a cross-sectional survey. There was a preference for SMS (32%) for negative STI results, and for SMS (27%), phone call (27%) and in-person (26%) for negative HIV results. An in-person preference was shown for receiving positive STI results (40%) and positive HIV results (56%, P < 0.001). While many clients would prefer to receive STI test results via text messages or phone call, many also still prefer a return visit, with this preference is dependent on the type and nature of the results. Our study suggests that, ideally, several options for obtaining results should be available.


2019 ◽  
Vol 12 (2) ◽  
pp. 149-158
Author(s):  
Muhammad Fadlan ◽  
Sinawati Sinawati ◽  
Aida Indriani ◽  
Evi Dianti Bintari

The importance of maintaining data integrity and security is one of the challenges in the current digital era. One method that can be used to face this challenge is through cryptography. In cryptography there are several algorithms that can be used, one of which is the Caesar cipher algorithm. This algorithm has several disadvantages, including a limited number of characters of 26 characters. This can make the encryption results easily recognizable by other parties. This study aims to design a proposal for maintaining data security through cryptographic techniques, while addressing the problems inherent in the Caesar cipher algorithm. The combination of Caesar and Beaufort algorithm is done to overcome the existing problems. In addition, a character list of 94 characters was determined to be used in the process of encryption and decryption of text data. The result, through the integration of these two algorithms, the text cipher becomes more difficult to solve. There are two stages of the encryption process by using two different types of Keys for each stage in securing data


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


2018 ◽  
Vol 28 (7) ◽  
pp. 2251-2257
Author(s):  
Roland Vasili ◽  
Endri Xhina ◽  
Ilia Ninka ◽  
Thomas Souliotis

In recent years, technology has developed a lot and has revolutionized our perspective of the world. Technology and more precisely digital technology has created amazing tools, giving immediate access to anyone interested to any information he may need. This digital revolution of all media like computers, smartphones, etc. has produced a huge amount of digital data to be handled. In our research we care about one aspect of this data, the text data, and the way we can efficiently handle text and produce meaningful summaries. Thus, it is only until recently that text mining has become an interesting research field due to this vast increase of text volume on the web. However, because of its size, this text volume should be summarized so as to get all the useful information efficiently and without trying to deal with all of the initial text, which could be impractical in many cases. Therefore, text summarization systems are among the most attractive research areas nowadays. Text summarization is the process of finding the main source of information, extracting the main important contents and presenting them as a concise text in the predefined template. The two main summarization techniques available are Extractive and Abstractive, with a lot of research being carried out in these areas, especially in extractive summarization. However, meaningful summaries are obtained using abstractive techniques which are more complex, due to the nature of this technique which requires the summary to be constructed in an abstract way without using sentences from the original text, while in the extractive case the summary consists of sentences from the original text. In this paper there is a theoretical approach where the widely used summarization techniques are described at a first level. Moreover, these techniques are then put into practice focusing only on the Albanian language, since the language is an important factor which might lead to different outcomes for each algorithm, due to its structure, its form and its rules. This is the first attempt in the field of summarization in Albanian language and there is a high need for future research works in this area. This paper investigates various proposed text summarization methods which are usually used in English (and possibly other widely used) languages, comparing them and concluding which method is suitable for summarizing documents in the Albanian language. We analyze various summarization algorithms and provide a formal way of verifying the correctness of our results, by using different metrics (e.g. ROUGE) to evaluate the summaries’ accuracy of each technique, by utilizing some gold standard summaries, which have been produced by linguistic experts. Finally, we will also provide the whole practical implementation of this work either by uploading it to a github repository so as to be publicly accessible by anyone or by providing our services as micro-services through a web-page.


2020 ◽  
Vol 1 (2) ◽  
pp. 114
Author(s):  
Dedy Ronald Saragi ◽  
Janter Manuel Gultom ◽  
Jose Andreas Tampubolon ◽  
Indra Gunawan

Data security on computers can provide a protection for our data. Cryptographic techniques are very important techniques in securing data. Cryptography is the science of encryption techniques where the "original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key, one of the modern cryptographic methods developed is the RC4 algorithm. RC4 algorithm (Ron’s Code / Rivest’s Cipher) is one algorithm that can be used to encrypt data so that the original data can only be read by someone who has the encryption key.


2020 ◽  
Vol 5 (3) ◽  
pp. 153
Author(s):  
Intan Fitriani ◽  
Aryo Baskoro Utomo

Along with the development of technology, Short Message Service (SMS) has begun to be used to communicate between someone and the system in an agency. But in some cases, the security of messages sent through the SMS application has not been well protected. To improve data security and confidentiality, cryptographic algorithms with Advanced Encryption Standard (AES) can be done. The method used is the Waterfall method. AES encryption testing is done by comparing the manual calculations and the results of the encryption on the system. Blackbox test, CrackStation test, and Avalanche Effect (AE) test were also carried out. Brute force test results using CrackStation software that ciphertext cannot be solved. And in the avalanche effect (AE) test, the AE value of each 128-bit AES key is 44.53%, 192-bit is 48.44%, and 256-bit is 56.25%. Therefore, 192-bit and 256-bit AES keys are recommended for use because AE values are in the range of 45% - 60%.


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Sign in / Sign up

Export Citation Format

Share Document