ANDROID DATA SECURITY USING CRYPTOGRAPHIC ALGORITHM COMBINATIONS

Authors

  • April Lia Hananto Information Systems Study Program School of Engineering and Computer Science Universitas Buana Perjuangan Karawang Author
  • Bayu Priyatna Information Systems Study Program School of Engineering and Computer Science Universitas Buana Perjuangan Karawang Author
  • Ai Rosita Widyatama University Author

DOI:

https://doi.org/10.61841/kwa1hr31

Keywords:

Android, LFSR, modification, playfair cipher, cryptography

Abstract

Android is a platform that is very vulnerable to hacked by bad people to steal users' data intentionally or unintentionally [1]. To deal with data disturbances it is necessary to use cryptography [2], one of which is Playfair Chipper. Playfair's cryptographic algorithms are currently being developed with various types of matrix table modifications, ranging from changes in matrix size, or changes in the encryption process steps. The results of applying the Playfair combination and modification algorithm with the Linear Feedback Ship Register (LFSR) for securing data on the Android platform. Testing the application of the results of the Playfair algorithm modification using the Avalanche Effect can be concluded that the resulting ciphertext has a high complexity. 

Downloads

Download data is not yet available.

References

[1] O. Ahmed and A. Sallow, “Android Security: A Review,” Acad. J. Nawroz Univ., vol. 6, no. 3, pp. 135–140, 2017.

[2] F. De Rango, G. Potrino, M. Tropea, and P. Fazio, “Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks,” Pervasive Mob. Comput., vol. 61, p. 101105, 2020.

[3] D. Atmodjo, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” vol. 4, no. 3, pp. 132–138, 2016.

[4] S. C. St and A. N. St, “A Comprehensive Study on Security issues in Android Mobile Phone — Scope and Challenges A Comprehensive Study on Security issues in Android Mobile Phone Scope and Challenges,” Int. J. Innov. Res. Adv. Eng., vol. 3, no. JANUARY, pp. 62–72, 2016.

[5] N. Indira, S. Rukmanidevi, and A. V Kalpana, “Light Weight Proactive Padding Based Crypto Security System in Distributed Cloud Environment,” pp. 1–9, 2019.

[6] H. B. Habib and H. B. Habib, “Diyala Journal for Pure Science,” no. 4, pp. 74–84, 2019.

[7] D. Kurniawan, A. L. Hananto, and B. Priyatna, “Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android,” Int. J. Comput. Tech. -–, vol. 5, no. 1, pp. 65–70, 2018.

[8] S. Dutta and A. Chakraborty, A Deep Learning-Inspired Method. Springer Singapore, 2019.

[9] S. Karunamurthi and V. Krishnasamy Natarajan, “VLSI implementation of reversible logic gates cryptography with LFSR key,” Microprocess. Microsyst., vol. 69, pp. 68–78, 2019.

[10] G. Srivastava, R. Agrawal, K. Singh, R. Tripathi, and K. Naik, “A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography,” Peer-to-Peer Netw. Appl., 2019.

[11] M. I. Fitrianda, Digital Digital Repository Repository Universitas Universitas Jember Jember Digital Digital Repository Repository Universitas Universitas Jember. 2013.

[12] R. M. Marzan, A. M. Sison, and R. P. Medina, “Randomness analysis on enhanced key security of Playfair cipher algorithm,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 4, pp. 1248–1253, 2019.

[13] J. Choudhary, R. Kumar Gupta, and S. Singh, “a Generalized Version of Play Fair Cipher,” Compusoft, vol. 2, no. 6, pp. 176–179, 2013.

[14] Prakash, G., Darbandi, M., Gafar, N., Jabarullah, N.H., & Jalali, M.R. (2019) A New Design of 2-Bit Universal Shift Register Using Rotated Majority Gate Based on Quantum-Dot Cellular Automata Technology, International Journal of Theoretical Physics, https://doi.org/10.1007/s10773-019-04181-w.

[15] Nurkifli, E. H. (2014). Modifikasi Algoritma Playfair dengan matriks 12x12, (Sentika).

[16] R. W. Simbolon, “Cipher Dan Steganografi Dengan Teknik Least Significant Bit ( Lsb ) Protecting The Student Academic Transcript Using Playfair Cipher Cryptography,” vol. 5, no. 1, pp. 59–70, 2016.

[17] Sugiyanto, Rinci Kembang Hapsari. (2016). Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere. Surabaya, ISSN 2085-4552

Downloads

Published

29.02.2020

How to Cite

Lia Hananto , A., Priyatna, B., & Rosita, A. (2020). ANDROID DATA SECURITY USING CRYPTOGRAPHIC ALGORITHM COMBINATIONS. International Journal of Psychosocial Rehabilitation, 24(1), 8201-8211. https://doi.org/10.61841/kwa1hr31