Loading [MathJax]/extensions/MathMenu.js
Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application | IEEE Conference Publication | IEEE Xplore

Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application


Abstract:

Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportun...Show More

Abstract:

Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportunities, including message sabotation. The use of cryptography was one of the right methods to maintain data or information security while a communication occurred. Message security was done by combining a symmetric encryption algorithm with a digital signature algorithm. Combination of AES and ECDSA is done as a method of securing messages. AES is used for message encryption, ECDSA is used as an identifier for the sender of the message. Confidentiality and data integrity is guaranteed through encrypting messages in the database and with carrying out digital signatures.
Date of Conference: 21-22 October 2020
Date Added to IEEE Xplore: 05 April 2021
ISBN Information:
Conference Location: Palu, Indonesia
References is not available for this document.

I. Introduction

The rapid development of technology made it easy for people to communicate. One of the communication technologies that were widely used by people were instant messaging [1] . The amount of data on mobile instant messaging users opened up opportunities for crime, including the message sabotation. Therefore an appropriate method was needed for encrypting a message from an instant messaging application, so that data or information securely while communication occurred were maintained.

Select All
1.
Global Messaging Apps 2019, [online] Available: https://www.emarketer.com/content/global-messaging-apps-2019.
2.
A. Sasongko, H. Hidayat, Y. Kurniawan and S. Sutikno, Architecture for the secret-key BC3 cryptography algorithm, 2011.
3.
S. Singh, D. Brahmjit and S. Poonam, Lightweight Cryptography : A Solution to Secure IoT, US:Springer, no. 0123456789, 2020.
4.
M Abdurohman, A Sasongko and R Rawung, Mobile tracking system based on event driven method, vol. 321, pp. 536-540, 2013.
5.
Muhamad Nursalman, Arif Sasongko, Yusuf Kurniawan and Kuspriyanto, "Generalizations of n-Term Karatsuba Like Formulae in GF(2n) with NAYK Algorithm", IAENG International Journal of Computer Science, Oct 16.
6.
R. Vijayakumar, S. Raja and M. Prabakaran, "ECDSA - Performance improvements of intrusion detection in Mobile Ad-hoc Networks", vol. 3, no. I, pp. 484-486, 2014.
7.
S. Levy, "Performance and Security of ECDSA", pp. 1-4, 2015.
8.
J.-S. Coron, E. P. Gutmann, D. Naccache and C. C. Palmer, "What Is Cryptography?", 2006.
9.
A. Bar-on, O. Dunkelman and N. Keller, "Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities", pp. 1-41.
10.
Muhamad Nursalman, Arif Sasongko, Yusuf Kurniawan and Kuspriyanto, "Improved Generalizations of The Karatsuba Algorithm in GF(2n)", IEEE International Conference on Advance Informatics: Concepts Theory and Applications, August 2014.
11.
R. Mondal, H. Ngo, J. Shey, R. Rakvic, O. Walker and D. Brown, "Efficient Architecture Design for the AES-128 Algorithm on Embedded Systems", pp. 89-97.
12.
"ADVANCED ENCRYPTION STANDARD (AES )", 2001.
13.
W. Stalling, Cryptography and Network Security–Principle and Practice, Pearson Education, 2003.
14.
D. Johnson, A. Menezes and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm ( ECDSA )", pp. 36-63, 2001.
15.
L. Angrisani, F. Member, P. Arpaia, S. Member, F. Bonavolont and A. Cioffi, "Experimental test of ECDSA digital signature robustness from timing-lattice attack", pp. 1-6, 2020.
16.
D. Manel, O. Raouf, H. Ramzi and A. Mtibaa, "Hash Function and Digital Signature based on Elliptic Curve", 2013.

Contact IEEE to Subscribe

References

References is not available for this document.