ANDROID DATA SECURITY USING CRYPTOGRAPHIC ALGORITHM COMBINATIONS
DOI:
https://doi.org/10.61841/kwa1hr31Keywords:
Android, LFSR, modification, playfair cipher, cryptographyAbstract
Android is a platform that is very vulnerable to hacked by bad people to steal users' data intentionally or unintentionally [1]. To deal with data disturbances it is necessary to use cryptography [2], one of which is Playfair Chipper. Playfair's cryptographic algorithms are currently being developed with various types of matrix table modifications, ranging from changes in matrix size, or changes in the encryption process steps. The results of applying the Playfair combination and modification algorithm with the Linear Feedback Ship Register (LFSR) for securing data on the Android platform. Testing the application of the results of the Playfair algorithm modification using the Avalanche Effect can be concluded that the resulting ciphertext has a high complexity.
Downloads
References
[1] O. Ahmed and A. Sallow, “Android Security: A Review,” Acad. J. Nawroz Univ., vol. 6, no. 3, pp. 135–140, 2017.
[2] F. De Rango, G. Potrino, M. Tropea, and P. Fazio, “Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks,” Pervasive Mob. Comput., vol. 61, p. 101105, 2020.
[3] D. Atmodjo, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” vol. 4, no. 3, pp. 132–138, 2016.
[4] S. C. St and A. N. St, “A Comprehensive Study on Security issues in Android Mobile Phone — Scope and Challenges A Comprehensive Study on Security issues in Android Mobile Phone Scope and Challenges,” Int. J. Innov. Res. Adv. Eng., vol. 3, no. JANUARY, pp. 62–72, 2016.
[5] N. Indira, S. Rukmanidevi, and A. V Kalpana, “Light Weight Proactive Padding Based Crypto Security System in Distributed Cloud Environment,” pp. 1–9, 2019.
[6] H. B. Habib and H. B. Habib, “Diyala Journal for Pure Science,” no. 4, pp. 74–84, 2019.
[7] D. Kurniawan, A. L. Hananto, and B. Priyatna, “Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android,” Int. J. Comput. Tech. -–, vol. 5, no. 1, pp. 65–70, 2018.
[8] S. Dutta and A. Chakraborty, A Deep Learning-Inspired Method. Springer Singapore, 2019.
[9] S. Karunamurthi and V. Krishnasamy Natarajan, “VLSI implementation of reversible logic gates cryptography with LFSR key,” Microprocess. Microsyst., vol. 69, pp. 68–78, 2019.
[10] G. Srivastava, R. Agrawal, K. Singh, R. Tripathi, and K. Naik, “A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography,” Peer-to-Peer Netw. Appl., 2019.
[11] M. I. Fitrianda, Digital Digital Repository Repository Universitas Universitas Jember Jember Digital Digital Repository Repository Universitas Universitas Jember. 2013.
[12] R. M. Marzan, A. M. Sison, and R. P. Medina, “Randomness analysis on enhanced key security of Playfair cipher algorithm,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 4, pp. 1248–1253, 2019.
[13] J. Choudhary, R. Kumar Gupta, and S. Singh, “a Generalized Version of Play Fair Cipher,” Compusoft, vol. 2, no. 6, pp. 176–179, 2013.
[14] Prakash, G., Darbandi, M., Gafar, N., Jabarullah, N.H., & Jalali, M.R. (2019) A New Design of 2-Bit Universal Shift Register Using Rotated Majority Gate Based on Quantum-Dot Cellular Automata Technology, International Journal of Theoretical Physics, https://doi.org/10.1007/s10773-019-04181-w.
[15] Nurkifli, E. H. (2014). Modifikasi Algoritma Playfair dengan matriks 12x12, (Sentika).
[16] R. W. Simbolon, “Cipher Dan Steganografi Dengan Teknik Least Significant Bit ( Lsb ) Protecting The Student Academic Transcript Using Playfair Cipher Cryptography,” vol. 5, no. 1, pp. 59–70, 2016.
[17] Sugiyanto, Rinci Kembang Hapsari. (2016). Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere. Surabaya, ISSN 2085-4552
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.