XTEA CRYPTOGRAPHY IMPLEMENTATION IN ANDROID CHATTING APP

Authors

  • Irfan Syamsuddin
  • Siska Ihdianty
  • Eddy Tungadi
  • Kasim Kasim
  • Irawan Irawan

DOI:

https://doi.org/10.30818/jitu.3.2.3622

Keywords:

information security, cryptography, XTEA, mathematics visualization

Abstract

Information security plays a significant role in information society. Cryptography is a key proof of concept to increasing the security of information assets and has been deployed in various algorithms. Among cryptography algorithms is Extended Tiny Encryption Algorithm. This study aims to describe a recent Android Apps to realize XTEA Cryptography in mobile form. In addition, a thorough example is presented to enable readers gain understanding on how it works within our Android Apps.

References

] D. Wheeler and R. Needham, TEA, a Tiny Encryption Algorithm (1994) http://www.ftp.cl.cam.ac.uk/ftp/papers/ djw-rmn/djw-rmn-tea.html

] D. Wheeler and R. Needham, XTEA (eXtended TEA), Technical report (1997)

] Y.Ko, H. Seokhie, W.Lee, S.Lee, and JS Kang. "Related key differential attacks on 27 rounds of XTEA and full-round GOST." In International Workshop on Fast Software Encryption, pp. 299-316. Springer, Berlin, Heidelberg, (2004).

] G.N. Khan, X. Yu, and F.Yuan. "A novel XTEA based authentication protocol for RFID systems." In 2011 XXXth URSI General Assembly and Scientific Symposium, pp. 1-4. IEEE, (2011).

] J.P. Kaps, "Chai-tea, cryptographic hardware implementations of xtea." In International Conference on Cryptology in India, pp. 363-375. Springer, Berlin, Heidelberg, (2008).

] M.H.AlMeer, "FPGA implementation of a hardware XTEA light encryption engine in co-design computing systems." In 2017 Seventh International Conference on Innovative Computing Technology (INTECH), pp. 26-30. IEEE, (2017).

] P.Israsena, "On XTEA-based encryption/ authentication core for wireless pervasive communication." In 2006 International Symposium on Communications and Information Technologies, pp. 59-62. IEEE, (2006).

] T.Isobe, and K.Shibutani. "Security analysis of the lightweight block ciphers XTEA, LED and Piccolo." In Australasian Conference on Information Security and Privacy, pp. 71-86. Springer, Berlin, Heidelberg, (2012).

] S.Maitra, and K.Yelamarthi. "Rapidly deployable IoT architecture with data security: Implementation and experimental evaluation." Sensors 19, no. 11 (2019.

Downloads

Published

2020-12-22

Issue

Section

Artikel

How to Cite

XTEA CRYPTOGRAPHY IMPLEMENTATION IN ANDROID CHATTING APP. (2020). Journal of Information Technology and Its Utilization, 3(2), 36-43. https://doi.org/10.30818/jitu.3.2.3622