Pengamanan Short Message Service ( SMS ) Menggunakan Algoritma Vibranium Cipher
DOI:
https://doi.org/10.30865/resolusi.v1i5.165Keywords:
Cryptography; Short Message Service (SMS); Plaintext; CiphertextAbstract
Security of SMS (Short Message Service) is one of the activities carried out so that SMS from an undisclosed information cannot be known by other people except those who are given the right to do so. There are several approaches to SMS security techniques that are still used by a number of people today, including by applying cryptographic techniques, steganographic techniques, watermarks and other techniques. A message that is not encoded or encrypted is called plaintext, while a message that has been encoded with a cryptographic algorithm is called ciphertext. . Cryptography is a technique of securing messages by encrypting the contents of the message so that it is safe, while the short message service is a service provided by cellular or Android phones to send and receive messages. The tapping occurs on the communication line, so the SMS text will be very easy to read by tapping, in data encryption, especially the one discussed, namely SMS, there are various algorithms that can be used to secure data, one of which is the vibranium cipher algorithm which uses blocks with a size of 128 bits which can help users to send short messages safely, quickly and easily
Downloads
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Pengamanan Short Message Service ( SMS ) Menggunakan Algoritma Vibranium Cipher
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Nifeyani Gulo

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).














