Improving Firebase BaaS Service Security in Counseling Chat Applications: AES-256 and CBC Approach for End-to-End Encryption
Abstract
The activities of using the internet and exchanging information and sending messages have used a lot of internet media, one of which is chat message media, but over time data and information security problems in chat messages that are often encountered are active and passive wiretapping. In this research, the author wants to create a counseling chat message security application using the AES (Advanced Encryption Standard) algorithm cryptographic method combined with the CBC (Cipher Block Chaining) technique which is an advanced development of the ECB (Electronic Code Book) technique. AES basically uses a block cipher with a length of 128 bits as the default operation, and the key length size varies from 128, 192 and 256 bits. so AES uses a 4x4 matrix equation with each section having a size of 1 byte. From these problems, research will be conducted to develop an application to accommodate the counseling process using a chat application that has the main focus of securing messages with image types and stored in the Firebase database service (Backend as a Service). As well as using the End-to-End service principle so that users do not need to do the encryption or decryption process directly because the process has been carried out by the system, this will also provide more security aspects in terms of confidentiality of key data and initialization vectors. So that the process of exchanging information using the media chat counseling application is secured and avoids tapping by irresponsible parties.
Keywords
Full Text:
PDFReferences
Alimzhanova, Z., Skublewska-Paszkowska, M., & Nazarbayev, D. (2023). Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study. IEEE Access, 11, 75686–75695. https://doi.org/10.1109/ACCESS.2023.3295909
Al-Mashhadani, M., & Shujaa, M. (2022). IoT security using AES encryption technology based ESP32 platform. Int. Arab J. Inf. Technol., 19(2), 214–223.
Arianto, B., Kurniadi, H., & Kurniasari, I. (2023). IMPLEMENTASI PENGARSIPAN ELEKTRONIK MENGGUNAKAN ENKRIPSI DAN DEKRIPSI DENGAN METODE AES DI UNISKA. JURNAL FASILKOM, 13(02), 259–268. https://doi.org/10.37859/jf.v13i02.5060
Gupta, M., & Sinha, A. (2021). Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks. International Journal of Information Technology, 13(3), 933–941. https://doi.org/10.1007/s41870-021-00626-w
Hafsa, A., Gafsi, M., Malek, J., & Machhout, M. (2021). FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption. Scientific Programming, 2021, 6610655. https://doi.org/10.1155/2021/6610655
Hidayat, A. (2022). Application of the AES Cryptographic Algorithm for E-mail Encryption and Description. INFOKUM, 10(5), 494–500. http://infor.seaninstitute.org/index.php/infokum/article/view/1001
Hidayat, T. (2019). ENCRYPTION SECURITY SHARING DATA CLOUD COMPUTING BY USING AES ALGORITHM: A SYSTEMATIC REVIEW. TEKNOKOM, 2(2), 11–16. https://doi.org/10.31943/teknokom.v2i2.39
K. R., R., Aithal, G., Shetty, S., & K., B. (2020). Image encryption scheme in public key cryptography based on cubic pells quadratic case. Indonesian Journal of Electrical Engineering and Computer Science, 20(1), 385. https://doi.org/10.11591/ijeecs.v20.i1.pp385-394
Kareem, S. M., & Rahma, A. M. S. (2021). New method for improving add round key in the advanced encryption standard algorithm. Information Security Journal: A Global Perspective, 30(6), 371–383. https://doi.org/10.1080/19393555.2020.1859654
Khaliq, K. F. (2021). Pengamanan Data Akta Dengan Metode Aes Berbasis Cloud Computing. JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP), 4(1), 509–512.
Kumar, K., Ramkumar, K. R., & Kaur, A. (2022). A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. Journal of King Saud University - Computer and Information Sciences, 34(6), 3878–3885. https://doi.org/10.1016/j.jksuci.2020.08.005
Muttaqin, K., & Rahmadoni, J. (2020). Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based. Journal of Applied Engineering and Technological Science (JAETS), 1(2), 113–123. https://doi.org/10.37385/jaets.v1i2.78
Nida, K., & Usiono, U. (2023). Peranan Bimbingan dan Konseling Dalam Pembentukan Karakteristik Siswa. Jurnal Pendidikan Dan Konseling (JPDK), 5(3), 64–72.
Panagiotou, P., Sklavos, N., Darra, E., & Zaharakis, I. D. (2020). Cryptographic system for data applications, in the context of internet of things. Microprocessors and Microsystems, 72, 102921. https://doi.org/10.1016/j.micpro.2019.102921
Rantelinggi, P. H., & Saputra, E. (2020). Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data. Jurnal Teknologi Informasi Dan Ilmu Komputer, 7(4), 661. https://doi.org/10.25126/jtiik.2020741838
Rifki Sadikin. (2012). Kriptografi untuk Keamanan Jaringan (Th. Arie Prabawati, Ed.). Andi Publisher .
DOI: https://doi.org/10.31326/jisa.v6i2.1783
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Mogar Nurhandhi, Agus Suhendar
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
JOURNAL IDENTITY
Journal Name: JISA (Jurnal Informatika dan Sains)
e-ISSN: 2614-8404, p-ISSN: 2776-3234
Publisher: Program Studi Teknik Informatika Universitas Trilogi
Publication Schedule: June and December
Language: English
APC: The Journal Charges Fees for Publishing
Indexing: EBSCO , DOAJ, Google Scholar, Arsip Relawan Jurnal Indonesia, Directory of Research Journals Indexing, Index Copernicus International, PKP Index, Science and Technology Index (SINTA, S4) , Garuda Index
OAI address: http://trilogi.ac.id/journal/ks/index.php/JISA/oai
Contact: jisa@trilogi.ac.id
Sponsored by: DOI – Digital Object Identifier Crossref, Universitas Trilogi
In Collaboration With: Indonesian Artificial Intelligent Ecosystem(IAIE), Relawan Jurnal Indonesia, Jurnal Teknologi dan Sistem Komputer (JTSiskom)
JISA (Jurnal Informatika dan Sains) is Published by Program Studi Teknik Informatika, Universitas Trilogi under Creative Commons Attribution-ShareAlike 4.0 International License.