Perancangan Aplikasi Chatting Symmetric Encryption dengan Metode SDLC

Authors

  • Andi Andi Universitas Internasional Batam
  • Jesson Jesson Universitas Internasional Batam
  • Kevin Kevin Universitas Internasional Batam
  • Melvin Lie Universitas Internasional Batam
  • Andik Yulianto Program Studi Sistem Informasi, Fakultas Ilmu Komputer, Universitas Internasional Batam

DOI:

https://doi.org/10.37253/telcomatics.v8i1.7385

Keywords:

chat, python, application, encryption

Abstract

Chat Application is an application that allow people to communicate with each other without face-to-face meetings or time issue. To design a well-functioning chat application, this study was conducted using the Software Development Life Cycle (SDLC) method for designing chat application. Apart from that, this study will be using the Python programming language, the PyMySQL module used to connect python to the database, and the Tkinter module is used as a tool in this study to create a Graphical User Interface (GUI) for chat application, and not to mention this study will be using Symmetry Encryption Cryptography to perform encryption and decryption of user chat data.

Downloads

Download data is not yet available.

References

Ali, A. H., & Sagheer, A. M. (2017). Design of Secure Chatting Application with End to End Encryption for Android Platform. Iraqi Journal for Computers and Informatics, 43(1), 22–27. https://doi.org/10.25195/2017/4315

Bardis, N. G. (2008). Design of a secure chat application based on AES cryptographic algorithm and key management. Proceedings of the 10th WSEAS International Conference on Mathematical Methods, Computational Techniques and Intelligent Systems, 486–491. https://www.researchgate.net/publication/234793505

Chandra, S., Bhattacharyya, S., Paira, S., & Alam, S. S. (2014). A study and analysis on symmetric cryptography. 2014 International Conference on Science Engineering and Management Research, ICSEMR 2014. https://doi.org/10.1109/ICSEMR.2014.7043664

Gurung, G., Shah, R., & Jaiswal, D. P. (2020). Software Development Life Cycle Models-A Comparative Study. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 30–37. https://doi.org/10.32628/CSEIT206410

Hendini, A. (2016). PEMODELAN UML SISTEM INFORMASI MONITORING PENJUALAN DAN STOK BARANG (STUDI KASUS: DISTRO ZHEZHA PONTIANAK). JURNAL KHATULISTIWA INFORMATIKA, VOL. IV, N.

Santoso, P. P., Rilvani, E., Trisnawan, A. B., Adiyarta, K., Napitupulu, D., Sutabri, T., & Rahim, R. (2018). Systematic literature review: Comparison study of symmetric key and asymmetric key algorithm. IOP Conference Series: Materials Science and Engineering, 420(1). https://doi.org/10.1088/1757-899X/420/1/012111

Vashi*, D., Bhadka, Dr. H. B., Patel, Dr. K., & Garg, Dr. S. (2019). Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 176–182. https://doi.org/10.35940/IJRTE.C6597.118419

Yulianto, B., Heriyanni, E., Dewi, L. C., & Adinugroho, T. Y. (2015). Architecture and Implementation of Instant Messaging in Educational Institution. Procedia Computer Science, 59, 5–13. https://doi.org/10.1016/j.procs.2015.07.331

Downloads

Published

2023-06-30

Issue

Section

Articles