Yanuar Bimantoro, Ratih Titi Komala Sari


Currently communication can be through various media, one of the most favorite is the instant messaging application because it presents complete features and can be used anywhere [1]. But digital data is vulnerable to theft, one example is when an application sends data to a server can be intercepted or the server is hacked [2]. Therefore required data security system one of which is encryption [3]. The research aims to implement encryption for data security using AES and RSA algorithms combined [4]. The method to be used is that AES will encrypt the original data and then the resulting AES key will be encrypted with RSA. Based on the results of combined testing these two algorithms can process data in the form of text and images in milisekon time and can still secure the original data.


Encryption, Instant Messaging, RSA, AES

Full Text:



A. Sukma Wijaya, D. T. Nugrahadi, M. I. Mazdadi, A. Farmadi, and A. Rusadi, “Implementation of RSA Encryption Algorithm on Instant Messaging Application,” Journal of Data Science and Software Engineering, vol. 1, no. 1, pp. 11-21, 2020.

A. Pujol, D. Magoni, L. Murphy, C. Thorpe, “Spying on Instant Messaging Servers: Potential Privacy Leaks through Metadata,” Transactions on Data Privacy, IIIA-CSIC, vol. 12, no. 2, pp.175-206, 2019.

A. Aminudin, G. P. Aditya, and S. Arifianto, “RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol,” Jurnal Teknologi dan Sistem Komputer, vol. 8, no. 2, pp. 113–120, Apr. 2020.

R. Siringoringo, “Analisis dan Implementasi Algoritma Rijndael (AES) dan Kriptografi RSA pada Pengamanan File,” Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer, vol. 2, no. 1, pp. 31–42, Apr. 2020.

N. Fandier Saragih, R. Jhonson Simamora, R. Siringoringo, and E. Novita Purba, “Konsep Pengamanan Video Conference Dengan Enkripsi AES-GCM Pada Aplikasi Zoom,” vol. 4, no. 2, pp. 109, 2020.

M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, “A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues,” IEEE Communications Surveys and Tutorials, vol. 22, no. 2. Institute of Electrical and Electronics Engineers Inc., pp. 1191–1221, Apr. 2020.

C. Biswas, U. D. Gupta, and M. Md. Haque, “An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography,” IEEE, Feb. 2019.

Y. Fatma, A. Hafid, and H. O. Dani, “Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB),” JUSIFO (Jurnal Sistem Informasi), vol. 6, no. 2, pp. 111–120, Dec. 2020.

E. Arboleda, J. Kris, P. Alegro, E. R. Arboleda, M. R. Pereña, and R. M. Dellosa, “Hybrid Schnorr, RSA, and AES Cryptosystem A new method of location estimation for fingerprinting localization technique of indoor positioning system View project Classification View project Hybrid Schnorr, RSA, and AES Cryptosystem,” Article in International Journal of Scientific & Technology Research, vol. 8, no. 10, pp. 1770-1776, Oct. 2019.

I. I. Lutfa, “Pengembangan Aplikasi Pesan Instan Terenkripsi Menggunakan Algoritma Kriptografi AES (Advanced Encryption Standard),” Jurnal Teknik Elektro Smart, vol.1, no.1, pp. 1-6, Aug. 2021.

DOI: https://doi.org/10.15408/jti.v14i2.23469 Abstract - 0 PDF - 0


  • There are currently no refbacks.

Copyright (c) 2022 Yanuar Bimantoro, Ratih Titi Komala Sari

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur. 
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@uinjkt.ac.id

Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.


JTI Visitor Counter: View JTI Stats

 Flag Counter