End-to-End Encryption Security Method
##plugins.themes.bootstrap3.article.main##
Abstract
Crimes such as wiretapping, data theft and other criminal acts in social media, especially in short messages are increasingly common. Several short message service companies are beginning to understand this and continue to strive to advance security features that can protect user data and privacy. One of these efforts is the development of an end-to-end encryption security method. In this article, the author hopes to be able to explain and provide a good understanding of this security method. So that it can be understood by the reader well.
##plugins.themes.bootstrap3.article.details##
[2] D. A. Meko, “Perbandingan Algoritma DES, AES, IDEA Dan Blowfish dalam Enkripsi dan Dekripsi Data,” Jurnal Teknologi Terpadu, vol. 4, no. 1, 2018.
[3] J. Jamaluddin, R. J. Simamora, and K. Sitepu, “Jurnal STINDO PROFESIONAL,” 2016.
[4] Y. Sri Maharani, S. Trisdiatin, M. Rafli Ihsanuddin, and F. Rahma, “SEMIOTIKA Seminar Nasional Teknologi Informasi dan Matematika Kekuatan Enkripsi End-to-End: Kajian Literatur Mengenai Kerahasiaan Komunikasi Digital dalam Aplikasi Pesan Instan,” 2023.
[5] Y. A. Ramadhan and R. Renaldy, “Analisis Ancaman, Metode dan Mitigasi dalam Keamanan Privasi Data di Internet,” Seminar Nasional Informatika-FTI UPGRIS, vol. 2, 2024.
[6] S. PROFESIONAL Jurnal Ekonomi, B. dan Teknologi, L. Juliana Pangaribuan, and D. Sitanggang, “Keamanan Pesan Whatsapp Menggunakan Kriptografi Algoritma Government Standard (Gost)”.
[7] R. Siringoringo, “Analisis dan Implementasi Algoritma Rijndael (AES) dan Kriptografi RSA pada Pengamanan File 31 Oleh : Rinmar Siringoringo Analisis dan Implementasi Algoritma Rijndael (AES) dan Kriptografi RSA pada Pengamanan File Article Information A B S T R A K,” 2020.
[8] “12009-23844-1-SM”.
[9] F. Fahrianto and A. Kitanggi, “Penerapan End-To-End Encryption Dengan Metode Super Encryption Untuk Kerahasiaan Citra Digital Pada Aplikasi Instant Messaging,” vol. 9, no. 1, 2016.
[10] S. P. Lestari et al., “JURNAL MEDIA INFORMATIKA [JUMIN] Realisasi Kriptografi Pada Fitur Enkripsi End-To-End Pesan Whatsapp.” [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jumin
[11] K. Andrea, A. Wardana, B. S. Wanandi, and A. Ikhwan, “Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp,” Januari, vol. 2, no. 1, p. 6, 2023, doi: 10.47233/jppie.v2i1.660.
[12] N. M. Milati, “Application of Picture Media to Improve Students’ English Present Continuous Tense Speaking Ability,” Jurnal Pendidikan Bahasa Inggris Undiksha, vol. 9, no. 3, pp. 333–338, 2021, doi: 10.23887/jpbi.v9i3.4.
[13] “12009-23844-1-SM”.
[14] “12009-23844-1-SM”.
[15] P. Studi Informatika and S. I. Tinggi Teknologi Dumai Jl Utama Karya Bukit Batrem Dumai, “Gellysa Urva.”

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.