Implementasi Algoritma Camellia Dalam Penyandian Pesan SMS Pada Telepon Seluler
Abstract
SMS technology also does not guarantee the security and confidentiality of messages sent. The distribution of message content is very vulnerable to interference or theft by irresponsible parties, because the message content that is plaintext (text-light) can be read by anyone, to reduce the risk caused by one way of overcoming it is to implement a cryptographic algorithm on the message sent. The cryptographic algorithm used is the Camellia cryptographic algorithm with a 128-bit key length. Camellia is a block cipher designed by experts in research and development in cryptographic techniques. With the encrypted message sent then someone who managed to steal information about the SMS message sent, then someone who succeeded in stealing information from the text message sent would find it difficult to know the contents of the message. Designed and built an application program using Android with an Android system of at least version 2.2 to facilitate users in encoding SMS messages.
Downloads
References
BUDI RAHARDJO, keamanan informasi berbasis Internet. jakarta, 2002.
Azanuddin, "Penyandian Short Message Service (SMS) Pada Telepon Selular Dengan Menggunakan Algoritma Gronsfeld," Pelita Informatika Budi Darma, vol. IV, p. 49, Agustus 2013.
Leo Willyanto Santoso, Gregorius Satia Budhi, Lanny Susanto, "Perbandingan Aplikasi Menggunakan Metode Camellia 128 Bit Key Dan 256 Bit Key," Jurnal Informatika, vol. 12, pp. 113-130, November 2014.
Budi Rahardjo, Keamanan Sistem Informasi Berbasis Internet. Jakarta, 2002.
Cangara. (2013, mei) Defenisi Pesan Menurut Ahli. [Online]. http://defenisiahli.blogspot.co.id/2013/05/defenisi-pesan-menurut-ahli-html
Luxemburg. (2016, Oktober) Pengertianmu.Com. [Online]. http://www.pengertianmu.com/2016/10/pengertian-teks-menurut-paraahli.html
Iwan Binanto, Multimedia Digital-Dasar Teori Dan Pengembangannya. Yogyakarta, 2010.
Yakub,Irwan Limiady Tri Puji Rahayu, "Aplikasi Enkripsi Pesan Teks(SMS) Pada Perangkat Handphone Dengan Algoritma Caesar Chiper," Sentika 2012, vol. 143, pp. 2089-9815, Maret 2012.
Romzi Imron Rozidi, Membuat Sendiri SMS Gateway Berbasis Protocol SMPP., 2004.
Dini Lestari Tresnani, "Kode Huffman Untuk Kompresi Sms," Program Studi Teknik Informatika, pp. 1-7, 2009.
Dony Ariyus, Pengantar Ilmu Kriptografi Teori Analisis dan Informasi. Yogyakarta, 2008.
Sentot Kromodimoejo, Teori dan Aplikasi Kriptografi.: SPK IT Consulting, 2010.
Rinaldi Munir, Kritografi. Bandung: Informatika Bandungg, 2006.
B. S. W. Poetro and R. Wardoyo, "Perbandingan Efisiensi, Efektifitas dan Kualiatas Algoritma Rijndael dengan Algoritma Camellia pada Citra Digital," J.Math.Nat.Sci, vol. 24, pp. 281-291, 2014.
L. Susanto, G. S. Budhi, and L. W. Santoso, "Perbandingan Menggunakan Metode Camellia 128 Bit Key dan 256 Bit Key," J. Inform, vol. 12, pp. 109-116, 2014.
K. Aoki et al, "Camelia A 128-Bit Block Cpiher Suitable for Multiple Platform-Design and Analysis Structure of Camelia," Springer-Verlag Berlin Heidelb , pp. 39-56, 2001.
Ahmad Rifqi Hadiyanto, "Algoritma Kunci Simetris Camelia," EC-510, pp. 3-15, 2004.
Nazruddin Safaat H, Pemograman Aplikasi Mobile Smartphone dan Tablet Pc Berbasis Android. Bandung, 2015.
Yuniar Supardi, Semua Bisa Menjadi Programmer Java. Jakarta, 2010.
Rosa A.S, M. Shalahuddin, Rekayasa Perangkat Lunak. Bandung, 2013.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Camellia Dalam Penyandian Pesan SMS Pada Telepon Seluler
Pages: 61-70
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















