2019
DOI: 10.15294/sji.v6i1.17589
|View full text |Cite
|
Sign up to set email alerts
|

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

Abstract: The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. A login system that used the database as user authentication and passwords are very vulnerable to be hacking. In securing data, various ways had been developed including cryptography. Cryptographic algorithms used in securing passwords usually used MD5 encryption. However,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…If the legitimate user receiver obtains the camouflaged information, he can restore the original confidential information from these information and decrypt and transform it. If the illegal user password analyst attempts to analyze the original confidential information from the camouflaged information, either this analysis is impossible, or the cost is too high to carry out [18][19][20]. To be exact, a cryptographic system consists of plaintext space, ciphertext space, cryptographic scheme, and key space: (1) the information to be encrypted is called plaintext, and all of the plaintext is called plaintext space.…”
Section: Methodsmentioning
confidence: 99%
“…If the legitimate user receiver obtains the camouflaged information, he can restore the original confidential information from these information and decrypt and transform it. If the illegal user password analyst attempts to analyze the original confidential information from the camouflaged information, either this analysis is impossible, or the cost is too high to carry out [18][19][20]. To be exact, a cryptographic system consists of plaintext space, ciphertext space, cryptographic scheme, and key space: (1) the information to be encrypted is called plaintext, and all of the plaintext is called plaintext space.…”
Section: Methodsmentioning
confidence: 99%
“…The combination of several cryptographic methods results in the encryption of data that cannot be read by people and increases the security of information data [7]. The encryption process uses an algorithm with several parameters [8].…”
Section: Introductionmentioning
confidence: 99%