Application of File Encryption and Decryption Using One Time Pad Algorithm
Main Article Content
Abstract
In maintaining a system security, it is very important to pay attention to that, namely an authentication process. This process is carried out in order to ensure that users who access data or information are users who have the right and authority. In authentication, there are several methods, one of which is using data encryption techniques, namely cryptography. Cryptography is implemented in data and information by coding or hiding the original data so that only certain parts have a key that can access the data or information. This research will apply the One Time Pad (OTP) Algorithm based on android which includes data encryption and decryption which will be designed using Android Studio to carry out encryption of stored data or information. The data will be in the form of ciphertext so that the user gets an access key for the data or information. In making this application, it is hoped that it will be useful in maintaining data security and confidentiality.
Downloads
Article Details
[2] L. Uhsadel, A. Poschmann, and C. Paar, ‘‘Enabling FullSize Public-Key Algorithms on 8-bit Sensor Nodes,’’Proc. 4th European Workshop Security and Privacy in Ad hoc and Sensor Networks (ESAS 07), LNCS 4572, Springer-Verlag, 2007, pp. 73-86
[3] M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, ‘‘AES Implementation on a Grain of Sand,’’ IEE Proc, vol. 152, no. 1, Oct. 2005, pp. 13-20.
[4] Novelan, M. S., Husein, A. M., Harahap, M., &Aisyah, S. (2018). SMS Security System on Mobile Devices Using Tiny Encryption Algorithm. Journal of Physics: Conference Series, 1007(1), 12037. Retrieved from http://stacks.iop.org/1742- 6596/1007/i=1/a=012037
[5] S. Kumar et al., ‘‘Breaking Ciphers with COPACOBANA—A Cost-Optimized Parallel Code Breaker,’’ Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 06), LNCS 4249, Springer, 2006, pp. 101-118
[6] S. Kumar, ‘‘Elliptic Curve Cryptography for Constrained Devices,’’ doctoral dissertation, Electrical Engineering and Information Sciences, Ruhr University Bochum: Germany, 2006.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.