Message Security on Chat App based on Massey Omura Algorithm

Taronisokhi Zebua, Rivalri Kristianto Hondro, Eferoni Ndruru


Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed

Full Text:



K. Chouhan and S. Ravi, “Public Key Encryption Techniques Provide Extreme Secure Chat Environment,” Int. J. Sci. Eng. Res., vol. 4, no. 6, pp. 510–516, 2013.

A. Singh, A. Nandal, and S. Malik, “Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 12, pp. 2277–128, 2012.

M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J. Sains Komput. Inform., vol. 2, no. 1, pp. 12–22, 2018.

R. Sivakumar and K. Thamodaran, “An Inventive Image Security System Based on Massey-Omura Encryption with Group,” Int. J. Adv. Res. Sci. Eng. Technol., vol. 3, no. 9, pp. 2656–2667, 2016.

M. Reza, M. A. Budiman, and D. Arisandi, “Simulasi Pengamanan File Teks Menggunakan Algoritma Massey-Omura,” Dunia Teknol. Inf., vol. 1, no. 1, pp. 20–27, 2012.

T. Zebua and E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,”J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.

R. K. Hondro, “Aplikasi Enkripsi dan Dekripsi SMS dengan Algoritma Zig Zag Cipher pada Mobile Phone Berbasis Android,” Pelita Inform. Budi Darma, vol. 10, no. 3, pp. 122–127, 2015.

R. MM, A. T, and R. A, “Development of Cryptography-Based Secure Messaging System,”J. Telecommun. Syst. Manag., vol. 5, no. 3, pp. 1–6, 2016.

E. Setyaningsih, Kriptografi dan Implementasinya Menggunakan Matlab, 1st ed. Yogyakarta: CV. Andi Publisher, 2015.

W. Stallings, Cryptography and Network Security, V. New York: Prentice Hall, 2011.

A. A. Abdullah; R. Khalaf; M. Riza, A Realizable Quantum ThreePass Protocol Authentication. Mathematical Problems in Engineering, 2015.

M. A. Mohamed, A. Muhammed, and M. Man, “A secure chat application based on pure peer-to-peer architecture,” J. Comput. Sci., vol. 11, no. 5, pp. 723–729, 2015.

R. N. Akram and R. K. L. Ko, “End-to-End Secure and Privacy Preserving Mobile Chat Application,” in Information Security Theory and Practice. Securing the Internet of Things, 2014, pp. 124–139.



  • There are currently no refbacks.

IJISTECH (International Journal Of Information System & Technology)
Online ISSN : 2580-7250

Published by

STIKOM Tunas Bangsa Pematangsiantar
Jl. Sudirman Blok A No. 1/2/3, Siantar Barat, Kota Pematang Siantar, Sumatera Utara, Kode Pos: 21127
Phone:(0622) 22431

 IJISTECH Published Papers Indexed/Abstracted By: