2016 Asia Pacific Conference on Multimedia and Broadcasting (APMediaCast) 2016
DOI: 10.1109/apmediacast.2016.7878165
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of encrypted SMS on Android smartphone combining ECDSA - ECDH and AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…Terdapat penelitian lainnya yang mengusulkan pendekatan kriptografi dalam SMS pada smartphone dengan sistem operasi android. Penelitian tersebut mengkombinasikan ECDSA (Elliptic Curve Digital Signature Algorithm), ECDH (Elliptic Curve Diffie-Hellman) dan AES [12]. Penelitian ini menggunakan AES dan ECDH untuk melakukan proses enkripsi dan dekripsi, sementara ECDSA digunakan untuk proses otentikasi saat terjadi pertukaran kunci publik.…”
Section: Penelitian Terdahuluunclassified
“…Terdapat penelitian lainnya yang mengusulkan pendekatan kriptografi dalam SMS pada smartphone dengan sistem operasi android. Penelitian tersebut mengkombinasikan ECDSA (Elliptic Curve Digital Signature Algorithm), ECDH (Elliptic Curve Diffie-Hellman) dan AES [12]. Penelitian ini menggunakan AES dan ECDH untuk melakukan proses enkripsi dan dekripsi, sementara ECDSA digunakan untuk proses otentikasi saat terjadi pertukaran kunci publik.…”
Section: Penelitian Terdahuluunclassified
“…Besides, because the schemes have smaller key size, it is suitable for constrained devices such as pagers, cellular phones and smart cards [52]. Moreover, these schemes also applied in different application such as email [53], short message service (SMS) [54] and cloud computing [55]. Hybrid algorithm basically provide the integration between public key cryptography and private key cryptography schemes [56][57][58][59][60][61]; between public key cryptography schemes [62] or between private key cryptography schemes [63].…”
Section: Figure 1 Public Key Cryptography Algorithms Classificationmentioning
confidence: 99%
“…Asymmetric cryptography is more efficient than the symmetric cryptography. PKC is used in digital signatures, key management purposes and facilitating no repudiation [6]. …”
Section: Asymmetric or Public Key Cryptography (Pkc)mentioning
confidence: 99%