Implementasi Algoritma Advanced Encryption Standard (AES) pada Layanan SMS Desa
DOI:
https://doi.org/10.14421/jiska.2020.53-03Abstract
Along with the development of technology, Short Message Service (SMS) has begun to be used to communicate between someone and the system in an agency. But in some cases, the security of messages sent through the SMS application has not been well protected. To improve data security and confidentiality, cryptographic algorithms with Advanced Encryption Standard (AES) can be done. The method used is the Waterfall method. AES encryption testing is done by comparing the manual calculations and the results of the encryption on the system. Blackbox test, CrackStation test, and Avalanche Effect (AE) test were also carried out. Brute force test results using CrackStation software that ciphertext cannot be solved. And in the avalanche effect (AE) test, the AE value of each 128-bit AES key is 44.53%, 192-bit is 48.44%, and 256-bit is 56.25%. Therefore, 192-bit and 256-bit AES keys are recommended for use because AE values are in the range of 45% - 60%.
References
Afrina, M., & Ibrahim, A. (2015). Pengembangan Sistem Informasi SMS Gateway Dalam Meningkatkan Layanan Komunikasi Sekitar Akademika Fakultas Ilmu Komputer Unsri. Jurnal Sistem Informasi (JSI), 7(2), 852–864.
Alvianto, A. R., & Darmaji. (2015). Pengaman Pengiriman Pesan Via SMS dengan Algoritma RSA Berbasis Android. JURNAL SAINS Dan SENI ITS.
Atmojo, W. P., Isnanto, R. R., & Kridalukmana, R. (2016). Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android. Jurnal Teknologi Dan Sistem Komputer. https://doi.org/10.14710/jtsiskom.4.3.2016.450-453
Azhar, R., & Kurniawan, K. (2017). Aplikasi Keamanan Sms Menggunakan Algoritma Rijndael. Jurnal Matrik, 16(1), 105. https://doi.org/10.30812/matrik.v16i1.15
Gumira, G., Ernawati, & Erlanshari, A. (2016). Implementasi Metode Advanced Encryption Standard (AES) Dan Message Digest 5 (MD5) Pada Enkripsi Dokumen (Studi Kasus LPSE UNIB). Jurnal Rekursif.
Ibrahim, A. A. (2017). Perancangan Pengamanan Data Menggunakan Algoritma AES (Advanced Encyption Standard). Jurnal Teknik Informatika STMIK Antar Bangsa, 3(1), 53–60.
Layansari, F. A., & Marisa, F. (2018). Perancangan Sistem Pelayanan Informasi Berbasis Sms Gateway Pada Kantor Dispendukcapil Kabupaten Belu. J I M P - Jurnal Informatika Merdeka Pasuruan. https://doi.org/10.37438/jimp.v3i2.169
Muharram, F., Azis, H., & Manga, A. R. (2018). Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES). Prosiding Seminar Nasional Ilmu Komputer Dan Teknologi Informasi.
Prasetya, D. R. (2013). Analisis Pengelolaan Pengaduan Masyarakat Dalam Rangka Pelayanan Publik (Studi Pada Dinas Komunikasi Dan Informatika Kota Malang). Jurnal Administrasi Publik Mahasiswa Universitas Brawijaya.
Purba, I. S., & Djamin, D. (2015). Partisipasi Masyarakat dalam Meningkatkan Good Governance di Tingkat Desa. Jurnal Ilmu Pemerintahan Dan Sosial Politik UMA, 3(1), 25–36. https://doi.org/10.31289/jppuma.v3i1.908
Sutanto, L., Budhi, G. S., & Santoso, L. W. (2015). PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY. Jurnal Informatika. https://doi.org/10.9744/informatika.12.2.109-116
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.