LAF Chat: A Message Encrypting Application Utilizing RSA Algorithm for Android-Based Mobile Device
Main Article Content
Abstract
The researchers have decided to create an application for the sole purpose of protecting once private information even as small as a basic text message. Using the Rivest Shamir Adleman algorithm (RSA). It is an algorithm used to encrypt and decrypt messages. It uses an asymmetric cryptography algorithm which means it has 2 different keys. Algorithm involves a public key and a private key. The public key could be shared to anyone; it used to encrypt the message. Message encrypted using the public key can only be decrypted with the private key. The use of the RSA Algorithm is mainly used in banks for security purposes; the researchers have proposed and developed a program that would use the algorithm, combining it in a mobile messaging application in Android and also using Google Cloud Messaging (GCM). Security, especially when it comes to phones is a problem. Private information is something one poses in their everyday lives, and people all over the world have tried to increases security but there are also those numbers of people that have tried stealing information to use for their personal gain. Security is almost slowly becoming impossible since the rapid improvement of technology.
Article Details
Article Accepting Policy
The editorial board of Thai-Nichi Institute of Technology is pleased to receive articles from lecturers and experts in the fields of business administration, languages, engineering and technology written in Thai or English. The academic work submitted for publication must not be published in any other publication before and must not be under consideration of other journal submissions. Therefore, those interested in participating in the dissemination of work and knowledge can submit their article to the editorial board for further submission to the screening committee to consider publishing in the journal. The articles that can be published include solely research articles. Interested persons can prepare their articles by reviewing recommendations for article authors.
Copyright infringement is solely the responsibility of the author(s) of the article. Articles that have been published must be screened and reviewed for quality from qualified experts approved by the editorial board.
The text that appears within each article published in this research journal is a personal opinion of each author, nothing related to Thai-Nichi Institute of Technology, and other faculty members in the institution in any way. Responsibilities and accuracy for the content of each article are owned by each author. If there is any mistake, each author will be responsible for his/her own article(s).
The editorial board reserves the right not to bring any content, views or comments of articles in the Journal of Thai-Nichi Institute of Technology to publish before receiving permission from the authorized author(s) in writing. The published work is the copyright of the Journal of Thai-Nichi Institute of Technology.
References
K. I. Lakhtaria, “Protecting Computer Network with Encryption Technique: A Study,” in Ubiquitous Computing and Multimedia Applications, 2011, pp. 381–390.
K. Gary C., “An Overview of Cryptography.” [Online]. Available: https://www.garykessler.net/library/crypto.html. [Accessed: 4-Jan-2016].
Practical Cryptography: Algorithms and Implementations Using C++, Boca Raton: CRC Press, 2015.
“Cryptography Breakthrough Could Make Software Unhackable,” WIRED. [Online]. Available: https://www.wired .com/2014/02/cryptography-breakthrough/. [Accessed: 8-Feb-2016].
“What is asymmetric cryptography (public key cryptography)? - Definition from WhatIs.com,” SearchSecurity. [Online]. Available: https://searchsecurity.techtarget.com/definition/asymmetric-cryptography. [Accessed: 18-Jul-2016].
W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644–654, Sep. 2006.
“Google Cloud Messaging: Overview | Cloud Messaging,” Google Developers. [Online]. Available: https:// developers.google.com/cloud-messaging/gcm. [Accessed: 24-Jun-2016].
“History of Java Technology,” Oracle. [Online]. Available: https://www.oracle.com/technetwork/java/javase/overview/javahistory-index-198355.html. [Accessed: 25-Jan-2016].
“What is RSA algorithm (Rivest-Shamir-Adleman)? - Definition from WhatIs.com,” SearchSecurity. [Online]. Available: https://searchsecurity.techtarget.com/definition/RSA. [Accessed: 16-Aug-2016].