Main Article Content

Muhammad Syahputra Novelan

Abstract

In maintaining a system security, it is very important to pay attention to that, namely an authentication process. This process is carried out in order to ensure that users who access data or information are users who have the right and authority. In authentication, there are several methods, one of which is using data encryption techniques, namely cryptography. Cryptography is implemented in data and information by coding or hiding the original data so that only certain parts have a key that can access the data or information. This research will apply the One Time Pad (OTP) Algorithm based on android which includes data encryption and decryption which will be designed using Android Studio to carry out encryption of stored data or information. The data will be in the form of ciphertext so that the user gets an access key for the data or information. In making this application, it is hoped that it will be useful in maintaining data security and confidentiality.

Downloads

Download data is not yet available.

Article Details

How to Cite
Novelan, M. S. (2020) “Application of File Encryption and Decryption Using One Time Pad Algorithm”, Jurnal Mantik, 4(3), pp. 2348-2353. doi: 10.35335/mantik.Vol4.2020.1270.pp2348-2353.
References
[1] G. Leander et al., ‘‘New Lightweight DES Variants,’’ Proc. Fast Software Encryption (FSE 07), LNCS 4593, Springer-Verlag, 2007, pp. 196-210
[2] L. Uhsadel, A. Poschmann, and C. Paar, ‘‘Enabling FullSize Public-Key Algorithms on 8-bit Sensor Nodes,’’Proc. 4th European Workshop Security and Privacy in Ad hoc and Sensor Networks (ESAS 07), LNCS 4572, Springer-Verlag, 2007, pp. 73-86
[3] M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, ‘‘AES Implementation on a Grain of Sand,’’ IEE Proc, vol. 152, no. 1, Oct. 2005, pp. 13-20.
[4] Novelan, M. S., Husein, A. M., Harahap, M., &Aisyah, S. (2018). SMS Security System on Mobile Devices Using Tiny Encryption Algorithm. Journal of Physics: Conference Series, 1007(1), 12037. Retrieved from http://stacks.iop.org/1742- 6596/1007/i=1/a=012037
[5] S. Kumar et al., ‘‘Breaking Ciphers with COPACOBANA—A Cost-Optimized Parallel Code Breaker,’’ Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 06), LNCS 4249, Springer, 2006, pp. 101-118
[6] S. Kumar, ‘‘Elliptic Curve Cryptography for Constrained Devices,’’ doctoral dissertation, Electrical Engineering and Information Sciences, Ruhr University Bochum: Germany, 2006.