Development of Cryptographic Mobile Applications for Text Encryption and Decryption

Authors

  • AHMAD YUSUF AL-HAFIZ Universitas Negeri Medan
  • ANGGI FERITA OKTAVIANI
  • AYU AMELIA PERTIWI
  • AZHARA AMELIA H
  • DESNI PARAMITHA PURBA
  • LENI KARMILA DAULAY
  • SABRINA AKVA
  • SARAH PUTRI SYAIFULLAH
  • YOHANA LORINEZ S

Keywords:

Kriptografi, Enkripsi, Deskripsi, Caesar Cipher, Vigenere Cipher, AES, Android

Abstract

Advances in information technology require data security systems that are capable of protecting personal information from threats of misuse and leakage. Cryptography is an important solution in maintaining the confidentiality and authenticity of data through the processes of encryption and decryption. This study aims to develop an Android-based mobile application capable of encrypting and decrypting text using three cryptographic algorithms, namely Caesar Cipher, Vigenere Cipher, and Advanced Encryption Standard (AES). The application was developed using Android Studio with the Java programming language and implemented a by-feature architecture approach so that each algorithm function is separate and easy to manage. Testing was conducted on texts of varying lengths and complexities to measure the speed and accuracy of the encryption and decryption processes. The test results showed that Caesar and Vigenere had execution times of less than 100 milliseconds for short texts, while AES provided a higher level of security with slightly longer processing times. The application also features an activity history and a simple, intuitive user interface. With a combination of classic and modern algorithms, this system can be used as an educational tool for learning cryptography concepts as well as a lightweight data security tool. The results of this research are expected to increase user awareness of the importance of protecting digital information on mobile devices.

References

[1] D. Firmansyah, “Rancang Bangun Aplikasi Enkripsi Pesan Teks Menggunakan Algoritma Vigenere Cipher,” Jurnal Teknologi dan Aplikasi, vol. 6, no. 1, pp. 15–22, 2021.

[2] R. Hidayat, “Perancangan Aplikasi Pesan Aman Menggunakan Algoritma Caesar dan Vigenere,” Jurnal Ilmu Komputer, vol. 5, no. 2, pp. 55–63, 2020.

[3] A. Salkanović, S. Ljubić, L. Stanković, and J. Lerga, “Analysis of Cryptography Algorithms Implemented in Android Mobile Application,” Information Technology and Control, vol. 50, no. 4, pp. 786–807, 2021.

[4] A. H. Nasution, “Implementasi Algoritma Caesar Cipher dalam Keamanan Pesan Teks pada Aplikasi Mobile,” Jurnal Teknologi dan Sistem Informasi, vol. 8, no. 1, 2022.

[5] D. R. Pratama, “Perbandingan Algoritma Vigenere Cipher dan Playfair Cipher dalam Proses Enkripsi Teks,” Jurnal Informatika, vol. 7, no. 2, pp. 77–85, 2021.

[6] M. A. Putra and R. Andriani, “Pengamanan File Teks Menggunakan Kombinasi Vigenere Cipher dan One-Time Pad,” Jurnal Ilmu Komputer dan Sistem Informasi, vol. 9, no. 2, 2023.

[7] S. Rahmawati and Y. Saputra, “Penerapan Algoritma Hybrid AES dan Caesar Cipher untuk Keamanan Data pada Aplikasi Mobile,” Jurnal Riset Informatika, vol. 13, no. 1, 2024.

[8] H. Siregar and B. Simanjuntak, “Aplikasi Android untuk Enkripsi File dan Pesan Menggunakan AES dan Vigenere,” Prosiding Seminar Nasional Teknologi Informasi, vol. 3, no. 1, pp. 122–130, 2021.

[9] M. N. Z. Soleh, “Kriptografi Homomorfik dalam Anonimisasi Data untuk Pengolahan Data pada Sistem E-Voting,” Jurnal Masyarakat Informatika, vol. 15, no. 2, 2024.

[10] A. Syahputra and T. Gunawan, “Implementasi Algoritma AES pada Penyimpanan File Android,” Jurnal Sistem Informasi, vol. 9, no. 3, 2023.

[11] F. Wibowo and F. Lestari, “Analisis Performa Algoritma AES pada Proses Enkripsi Data di Smartphone Android,” Jurnal Teknologi Informasi dan Komputer, vol. 10, no. 3, 2022.

[12] A. A. Permana, “Penerapan Kriptografi Pada Teks Pesan dengan Menggunakan Metode Vigenere Cipher Berbasis Android,” Jurnal Al-Azhar Indonesia Seri Sains dan Teknologi, vol. 4, no. 3, pp. 110–116, 2018.

[13] E. Safrianti and F. Fitriansyah, “Cryptography with Layered Algorithms for Text Security on Android,” International Journal of Electrical, Energy and Power System Engineering, vol. 3, no. 2, pp. 35–39, 2020.

[14] A. Taqwa and D. Sulaksono, “Implementasi Kriptografi Dengan Metode Elliptic Curve Cryptography (ECC) Untuk Aplikasi Chatting Dalam Cloud Computing Berbasis Android,” Kernel: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika, vol. 1, no. 1, pp. 42–48, 2020.

[15] S. Saefudin and S. Syamsudin, “Aplikasi Enkripsi Pesan Teks Dengan Metode Advanced Encryption Standard Pada Ponsel Berbasis Android,” JSiI (Jurnal Sistem Informasi), vol. 4, no. 2, pp. 50–57, 2017.

[16] A. Hermawan, A. Halim, D. Susilawati, and I. A. Putri, “Implementasi Algoritma Advanced Encryption Standard dan Caesar Cipher pada Pesan Terenkripsi,” Jurnal Informatika dan Rekayasa Perangkat Lunak, vol. 5, no. 1, pp. 13–21, 2023.

[17] F. Rahmad and A. Anwar, “Implementasi Kriptografi Dengan Metode Advanced Encryption Standard (AES) Untuk Realtime Chat Berbasis Mobile Pada E-Learning Politeknik Negeri Lhokseumawe,” J-AISE: Journal of Artificial Intelligence and Software Engineering, vol. 1, no. 2, pp. 45–52, 2021.

[18] A. Farissi, A. Pradata, and K. Miraswan, “Securing Messages Using AES Algorithm and Blockchain Technology on Mobile Devices,” SinkrOn: Jurnal dan Penelitian Teknik Informatika, vol. 8, no. 2, pp. 1166–1171, 2023.

[19] Y. Laia, M. Nababan, O. Sihombing, and others, “File Cryptography with AES and RSA for Mobile Based on Android,” Journal of Physics: Conference Series, vol. 1007, no. 1, pp. 1–7, 2018.

[20] M. Mulyadi, “Aplikasi Kriptografi Pesan Teks Menggunakan Algoritma Advanced Encryption Standard 256 Bit (AES-256) dan Diffie Hellman,” Sisfo: Jurnal Ilmiah Sistem Informasi, vol. 7, no. 2, pp. 23–30, 2022.

Published

2025-10-15

How to Cite

AL-HAFIZ, A. Y., OKTAVIANI, A. F., PERTIWI, A. A., AMELIA H, A., PURBA, D. P., DAULAY, L. K., … LORINEZ S, Y. (2025). Development of Cryptographic Mobile Applications for Text Encryption and Decryption . Journal of Computer Technology and Science, 1(1). Retrieved from https://journal.mediapertek.com/index.php/j-cts/article/view/4

Similar Articles

You may also start an advanced similarity search for this article.