PENGAMANAN PESAN TEKS BERBASIS END-TO-END ENCRYPTION MENGGUNAKAN ALGORITMA AES 256 BIT DAN ECDH

SYARIF, NABIEL OMAR and Arsalan, Osvari and Darmawahyuni, Annisa (2025) PENGAMANAN PESAN TEKS BERBASIS END-TO-END ENCRYPTION MENGGUNAKAN ALGORITMA AES 256 BIT DAN ECDH. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_55201_09021182025031_Cover.jpeg] Image
RAMA_55201_09021182025031_Cover.jpeg - Cover Image
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (495kB) | Request a copy
[thumbnail of RAMA_55201_09021182025031.pdf] Text
RAMA_55201_09021182025031.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_TURNITIN.pdf] Text
RAMA_55201_09021182025031_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_01_front_ref.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (854kB)
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_02.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (390kB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_03.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (473kB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_04.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_05.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_06.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_06.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (109kB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_07_ref.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_07_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (111kB) | Request a copy
[thumbnail of RAMA_55201_09021182025031_0028068806_0030069005_08_lamp.pdf] Text
RAMA_55201_09021182025031_0028068806_0030069005_08_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (75kB) | Request a copy

Abstract

Digital communication security is critical amid growing privacy threats, particularly on instant messaging platforms vulnerable to eavesdropping. One solution to address this challenge is the use of encryption. This study aims to enhance the security of text messages through the implementation of End-to-End Encryption (E2EE) by combining the Advanced Encryption Standard (AES) 256-bit for symmetric encryption and the Elliptic Curve Diffie-Hellman (ECDH) for secure key exchange. AES was selected for its ability to provide fast and efficient encryption, while ECDH ensures secure key exchange through the mathematical complexity of elliptic curves. The results demonstrate that AES 256-bit achieves an average encryption time of 0.0196 milliseconds for text ranging from 3 to 30 characters, accompanied by an Avalanche Effect of 77%, indicating optimal ciphertext randomness. Meanwhile, ECDH successfully prevented key interception during the exchange process, and the system withstood simulated man-in-the- middle attacks. Thus, the combination of AES and ECDH proves effective as a secure and efficient E2EE solution for instant messaging applications.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Kriptografi, End-to-End Encryption, AES, ECDH
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Divisions: 09-Faculty of Computer Science > 55201-Informatics (S1)
Depositing User: Nabiel Omar Syarif
Date Deposited: 13 Mar 2025 02:52
Last Modified: 13 Mar 2025 02:52
URI: http://repository.unsri.ac.id/id/eprint/168489

Actions (login required)

View Item View Item