CHAT SIMULATOR USING AES ENCRYPTION

Main Article Content

Sukhwinderjit Singh
Hadian Satria Utama
Joni Fat

Abstract

Smartphones have become an integral part the lives of individuals and their priorities The present moment. The most
visible uses are to chat and chat programs Most of these apps do does not provide the necessary protection and
privacy information exchanged between users. Chat apps have become one of the most important and popular
smartphone apps. It has the ability to exchange text messages, images and files that can freely communicate with each
other. All messages must be protected and in this paper the encryption to used for secure all messages is by using AES
encryption. AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely used to keep data
confidential in Internet networks. AES uses a block cipher with a block length of 128 bits and can encrypt data with
keys consisting of 128, 192, or 256 bits. AES is one of the strongest encryption algorithms available today. It has been
adopted by many organizations, including governments, banks, and technology companies. AES security is based on
mathematical complexity and is difficult to crack even on ultra-fast computers. The AES encryption process involves
multiple steps such as replace, move, and merge. The original data is split into smaller blocks and encrypted with the
provided key. The blocks then change periodically, complicating the data patterns an attacker might find

Article Details

Section
Articles
Author Biographies

Sukhwinderjit Singh, Universitas Tarumanagara

Electrical Engineering Department

Hadian Satria Utama, Universitas Tarumanagara

Electrical Engineering Department

Joni Fat, Universitas Tarumanagara

Electrical Engineering Department

References

Sabah, N., Kadhim, J. M., & Dhannoon, B. N. (2017). Developing an End-to-End Secure

Chat Application Image processing View project image processing and Artificial

intelligence View project Developing an End-to-End Secure Chat Application. In IJCSNS

International Journal of Computer Science and Network Security (Vol. 17, Issue 11).

https://www.researchgate.net/publication/322509087

H. Ali, A., & Sagheer, A. M. (2017). Design of an Android Application for Secure Chatting.

International Journal of Computer Network and Information Security, 9(2), 29–35.

https://doi.org/10.5815/ijcnis.2017.02.04

Ali, A. H., & Sagheer, A. M. (2017). Design of Secure Chatting Application with End to End

Encryption for Android Platform. Iraqi Journal for Computers and Informatics, 43(1), 22–

https://doi.org/10.25195/2017/4315

Vashishtha, J. (2012). Evaluating the performance of Symmetric Key Algorithms: AES

(Advanced Encryption Standard) and DES (Data Encryption Standard). In IJCEM

International Journal of Computational Engineering & Management (Vol. 15).

www.IJCEM.orgIJCEMwww.ijcem.org

Sari, C. A., Rachmawanto, E. H., & Haryanto, C. A. (2018). Cryptography Triple Data

Encryption Standard (3DES) for Digital Image Security. Scientific Journal of Informatics,

(2), 2407–7658. http://journal.unnes.ac.id/nju/index.php/sji

Salama, D., Elminaam, A., Mohamed, H., Kader, A., & Hadhoud, M. M. (2010). Evaluating

The Performance of Symmetric Encryption Algorithms Higher Technological Institute 10th

of Ramadan City. In International Journal of Network Security (Vol. 10, Issue 3).

Ajagbe, S. A., Adesina, A. O., & Oladosu, J. B. (2019). EMPIRICAL EVALUATION OF

EFFICIENT ASYMMETRIC ENCRYPTION ALGORITHMS FOR THE PROTECTION

OF ELECTRONIC MEDICAL RECORDS (EMR) ON WEB APPLICATION.

International Journal of Scientific & Engineering Research, 10(5). http://orcid.org/0000-

-7010-5540http://www.ijser.org

International Journal of Application on Sciences, Technology and Engineering

(IJASTE)

Volume 1, Issue 3, 2023 ISSN:2987-2499

https://doi.org/10.24912/ijaste.v1.i3.931-940 940

Singh, S., & Attri, V. K. (2015). Dual Layer Security of data using LSB Image

Steganography Method and AES Encryption Algorithm. International Journal of Signal

Processing, Image Processing and Pattern Recognition, 8(5), 259–266.

https://doi.org/10.14257/ijsip.2015.8.5.27