Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp
Abstract
At this time chat has been considered as a facility that can be used to communicate directly both remotely and at close range. Those who must be connected online with internet users around the world. In this case, this research will be applied to the WhatsApp text messaging application using the method applied, namely Caesar cipher cryptography. The system development method that will be used for this research is the prototype method. The results obtained from this research method are chat messages on the WhatsApp application encrypted using Caesar cipher cryptography with message encryption using end-to-end processing techniques where encryption and message descriptions can be done while chatting.
Downloads
References
[2] I. Febriana and G. A. S, “Penerapan Teknik Kriptografi Pada Keamanan Smsandroid,” JOEICT (Jurnal Educ. Inf. Commun. Technol., vol. 1, no. 1, pp. 29–36, 2017.
[3] A. Rifa’i and L. C. Sumartini, “Implementasi Kriptografi Menggunakan Metode Blowfish Dan Base64 Untuk Mengamankan Database Informasi Akademik Pada Kampus Akademi Telekomunikasi Bogor Berbasis Web-Based,” J. E-Komtek, vol. 3, no. 2, pp. 87–96, 2019, doi: 10.37339/e-komtek.v3i2.133.
[4] A. A. Permana, “Penerapan Kriptografi Pada Teks Pesan dengan Menggunakan Metode Vigenere Cipher Berbasis Android,” J. Al-AZHAR Indones. SERI SAINS DAN Teknol., vol. 4, no. 3, p. 110, 2018, doi: 10.36722/sst.v4i3.280.
[5] S. Anwar, I. Nugroho, and A. Ahmadi, “Implementasi Kriptografi Dengan Enkripsi Shift Vigenere Chiper Serta Checksum Menggunakan CRC32 Pada Data Text,” JSiI (Jurnal Sist. Informasi), vol. 2, pp. 51–58, 2017, doi: 10.30656/jsii.v2i0.6
[1] A. Sutoyo, Nurhayati, and I. Gultom, “Implementasi Super Enkripsi Algrotma One Time Pad (OTP) dan Beaufort Cipher untuk Mengamankan Data,” J. Sist. Inf. Kaputama, vol. 3, no. 1, pp. 1–5, 2019.
[2] I. Febriana and G. A. S, “Penerapan Teknik Kriptografi Pada Keamanan Smsandroid,” JOEICT (Jurnal Educ. Inf. Commun. Technol., vol. 1, no. 1, pp. 29–36, 2017.
[3] A. Rifa’i and L. C. Sumartini, “Implementasi Kriptografi Menggunakan Metode Blowfish Dan Base64 Untuk Mengamankan Database Informasi Akademik Pada Kampus Akademi Telekomunikasi Bogor Berbasis Web-Based,” J. E-Komtek, vol. 3, no. 2, pp. 87–96, 2019, doi: 10.37339/e-komtek.v3i2.133.
[4] A. A. Permana, “Penerapan Kriptografi Pada Teks Pesan dengan Menggunakan Metode Vigenere Cipher Berbasis Android,” J. Al-AZHAR Indones. SERI SAINS DAN Teknol., vol. 4, no. 3, p. 110, 2018, doi: 10.36722/sst.v4i3.280.
[5] S. Anwar, I. Nugroho, and A. Ahmadi, “Implementasi Kriptografi Dengan Enkripsi Shift Vigenere Chiper Serta Checksum Menggunakan CRC32 Pada Data Text,” JSiI (Jurnal Sist. Informasi), vol. 2, pp. 51–58, 2017, doi: 10.30656/jsii.v2i0.69.
[6] M. M. Amin, “Komunikasi Berbasis Teks,” J. Pseudocode, vol. III, no. September, pp. 129–136, 2016.
[7] N. Muzaqqi, “Implementasi Kriptografi Algoritma Exclusive OR Kombinasi Algoritma RC4 sebagai Pengamanan Dokumen dengan Memanfaatkan QR-Code,” no. 1210651119, 2017, [Online]. Available: http://repository.unmuhjember.ac.id/id/eprint/639

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.