Analisis Penerapan Algoritma Kriptografi Rivest-Shamir-Adleman (RSA) dan Zero-Knowledge Proof Pada Aplikasi Whatsapp Mod

  • Andika Abadi Pamungkas Singaperbangsa Karawang University
  • Agung S.Y. Irawan Universitas Singaperbangsa Karawang

Abstract

With the rapid development of technology and the large amount of digitization in various fields of human life, it is necessary to pay attention to the security and certainty of privacy so that there is no leakage of confidential data, both in the private and governmental domains, especially in Indonesia. In this case cyber-attacks will grow and become more numerous; therefore we need a security principle that can prevent these cyber-attacks, especially in sending something that is sensitive which can be called cryptography. One of the applications that can be implemented regarding this cryptography is the Whatsapp application. WhatsApp claims that the application is safe from data theft and messages being intercepted. However, this is doubtful with the presence of Whatsapp Mod which offers more features than the official application. The security of the modified Whatsapp is questionable, so in this study a test was carried out using the MobSF Framework to find out whether there were security holes that could endanger its users. The results of this research are in the form of a report issued by MobSF regarding the level of danger of the Whatsapp Mod Application. With this research, it is hoped that it will be able to make Whatsapp Mod users aware of the dangers of modified applications and Whatsapp can provide advice and strict action against the Whatsapp Mod developers.

References

Santoso, B., Ghofur, M. A., & Kuswanto, J. (2021). Analysis of WhatsApp Mod User Awareness Information Security with Static Analysis Methods and Quantitative Methods. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3(November), 213–222. https://doi.org/10.54706/senastindo.v3.2021.128

Suseno, A. Y., Sulistiyowati, N., & -, P. (2021). Analisis Peningkatan hybrid Cryptosystem Untuk Enkripsi dan Dekripsi Menggunakan Vigenere Cipher dan RSA Pada Text. In STRING (Satuan Tulisan Riset dan Inovasi Teknologi) (Vol. 6, Issue 2). https://doi.org/10.30998/string.v6i2.10309

WhatsApp. (2021). End-to-End Encrypted Backups on WhatsApp. WhatsApp, 1–

https://blog.whatsapp.com/end-to-end-encrypted-backups-on-whatsapp

Morais, E., Koens, T., van Wijk, C., & Koren, A. (2019). A survey on zero knowledge range proofs and applications. SN Applied Sciences, 1(8), 1–17. https://doi.org/10.1007/s42452-019-0989-z

Kuncoro, T. R., & Aditama, R. (2019). Analisis Kombinasi Algoritma Kriptografi Rsa Dan Algoritma Steganografi Least Significant Bit (Lsb) Dalam Pengamanan Pesan Digital. Statmat : Jurnal Statistika Dan Matematika, 1(2), 60–82. https://doi.org/10.32493/sm.v1i2.2947

Narendren, S., Yathish, Y. B., & B, C. M. (2018). A Cryptosystem using Two Layers of Security - DNA and RSA Cryptography. 119(7), 217–224.

Mallouli, F., Hellal, A., Sharief Saeed, N., & Abdulraheem Alzahrani, F. (2019). A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019,173–176. https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022

Hassan, M. A., Shukur, Z., & Mohd, M. (2022). A Penetration Testing on Malaysia Popular e-Wallets and m-Banking Apps. International Journal of Advanced Computer Science and Applications, 13(5). https://doi.org/10.14569/ijacsa.2022.0130580

Al-Delayel, S. A. (2022). Security Analysis of Mobile Banking Application in Qatar. http://arxiv.org/abs/2202.00582

Almohaini, R., Almomani, I., & Alkhayer, A. (2021). Hybrid-based analysis impact on ransomware detection for android systems. Applied Sciences (Switzerland), 11(22). https://doi.org/10.3390/app112210976

Antonishyn, M., & Misnik, O. (2019). Analysis of testing approaches to Android mobile application vulnerabilities. CEUR Workshop Proceedings, 2577, 270–280.

Kumar, K. A., Raman, A., Gupta, C., & Pillai, R. R. (2020). The recent trends in malware evolution, detection and analysis for android devices. Journal of Engineering Science and Technology Review, 13(4), 240–248. https://doi.org/10.25103/jestr.134.25

Janus Android Vulnerability. (n.d.). NHS Digital. https://digital.nhs.uk/cyber-alerts/2017/cc-1886

Why are hash collisions big news? (2017, July 1). Information Security Stack Exchange.https://security.stackexchange.com/questions/163177/why-are-hash-collisions-big-news

Lake, J. (2022, March 30). What is a collision attack? Comparitech. https://www.comparitech.com/blog/information-security/what-is-a-collision-attack/

Published
2023-07-14
How to Cite
Pamungkas, A., & Irawan, A. (2023). Analisis Penerapan Algoritma Kriptografi Rivest-Shamir-Adleman (RSA) dan Zero-Knowledge Proof Pada Aplikasi Whatsapp Mod. Jurnal Ilmiah Wahana Pendidikan, 9(13), 81-95. https://doi.org/10.5281/zenodo.8145614