Analisis Penerapan Algoritma Kriptografi Rivest-Shamir-Adleman (RSA) dan Zero-Knowledge Proof Pada Aplikasi Whatsapp Mod
Abstract
With the rapid development of technology and the large amount of digitization in various fields of human life, it is necessary to pay attention to the security and certainty of privacy so that there is no leakage of confidential data, both in the private and governmental domains, especially in Indonesia. In this case cyber-attacks will grow and become more numerous; therefore we need a security principle that can prevent these cyber-attacks, especially in sending something that is sensitive which can be called cryptography. One of the applications that can be implemented regarding this cryptography is the Whatsapp application. WhatsApp claims that the application is safe from data theft and messages being intercepted. However, this is doubtful with the presence of Whatsapp Mod which offers more features than the official application. The security of the modified Whatsapp is questionable, so in this study a test was carried out using the MobSF Framework to find out whether there were security holes that could endanger its users. The results of this research are in the form of a report issued by MobSF regarding the level of danger of the Whatsapp Mod Application. With this research, it is hoped that it will be able to make Whatsapp Mod users aware of the dangers of modified applications and Whatsapp can provide advice and strict action against the Whatsapp Mod developers.
References
Santoso, B., Ghofur, M. A., & Kuswanto, J. (2021). Analysis of WhatsApp Mod User Awareness Information Security with Static Analysis Methods and Quantitative Methods. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3(November), 213–222. https://doi.org/10.54706/senastindo.v3.2021.128
Suseno, A. Y., Sulistiyowati, N., & -, P. (2021). Analisis Peningkatan hybrid Cryptosystem Untuk Enkripsi dan Dekripsi Menggunakan Vigenere Cipher dan RSA Pada Text. In STRING (Satuan Tulisan Riset dan Inovasi Teknologi) (Vol. 6, Issue 2). https://doi.org/10.30998/string.v6i2.10309
WhatsApp. (2021). End-to-End Encrypted Backups on WhatsApp. WhatsApp, 1–
https://blog.whatsapp.com/end-to-end-encrypted-backups-on-whatsapp
Morais, E., Koens, T., van Wijk, C., & Koren, A. (2019). A survey on zero knowledge range proofs and applications. SN Applied Sciences, 1(8), 1–17. https://doi.org/10.1007/s42452-019-0989-z
Kuncoro, T. R., & Aditama, R. (2019). Analisis Kombinasi Algoritma Kriptografi Rsa Dan Algoritma Steganografi Least Significant Bit (Lsb) Dalam Pengamanan Pesan Digital. Statmat : Jurnal Statistika Dan Matematika, 1(2), 60–82. https://doi.org/10.32493/sm.v1i2.2947
Narendren, S., Yathish, Y. B., & B, C. M. (2018). A Cryptosystem using Two Layers of Security - DNA and RSA Cryptography. 119(7), 217–224.
Mallouli, F., Hellal, A., Sharief Saeed, N., & Abdulraheem Alzahrani, F. (2019). A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019,173–176. https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022
Hassan, M. A., Shukur, Z., & Mohd, M. (2022). A Penetration Testing on Malaysia Popular e-Wallets and m-Banking Apps. International Journal of Advanced Computer Science and Applications, 13(5). https://doi.org/10.14569/ijacsa.2022.0130580
Al-Delayel, S. A. (2022). Security Analysis of Mobile Banking Application in Qatar. http://arxiv.org/abs/2202.00582
Almohaini, R., Almomani, I., & Alkhayer, A. (2021). Hybrid-based analysis impact on ransomware detection for android systems. Applied Sciences (Switzerland), 11(22). https://doi.org/10.3390/app112210976
Antonishyn, M., & Misnik, O. (2019). Analysis of testing approaches to Android mobile application vulnerabilities. CEUR Workshop Proceedings, 2577, 270–280.
Kumar, K. A., Raman, A., Gupta, C., & Pillai, R. R. (2020). The recent trends in malware evolution, detection and analysis for android devices. Journal of Engineering Science and Technology Review, 13(4), 240–248. https://doi.org/10.25103/jestr.134.25
Janus Android Vulnerability. (n.d.). NHS Digital. https://digital.nhs.uk/cyber-alerts/2017/cc-1886
Why are hash collisions big news? (2017, July 1). Information Security Stack Exchange.https://security.stackexchange.com/questions/163177/why-are-hash-collisions-big-news
Lake, J. (2022, March 30). What is a collision attack? Comparitech. https://www.comparitech.com/blog/information-security/what-is-a-collision-attack/