Android File Security Application with AES Encryption and Fingerprint Authentication

##plugins.themes.bootstrap3.article.main##

Habib Husain Amirullah Ade Eviyanti Sumarno Sumarno

Abstract

Data security in the current digital era has become critically important. Data and digital document thefts continue to occur, with an average cost of $3.86 million due to data breaches in 2018. To tackle this challenge, cryptography, particularly encryption, has become a key element in maintaining data confidentiality and integrity. The Advanced Encryption Standard (AES) has become the global standard for preserving data confidentiality by transforming data into a form that is difficult to decipher without the correct key. However, AES security relies heavily on the strength of the key used, posing risks of weak keys and potential negligence. This research aims to address these issues by combining AES-128 as the encryption algorithm and fingerprint-based authentication to enhance security access. The use of fingerprint biometric verification provides a user-friendly layer of security. The application was tested using Automated Testing, which is a method for testing a system using a series of scripts. The test results demonstrate that by combining the latest encryption technology and biometric authentication, this research successfully developed an application capable of encrypting data using the AES algorithm and integrating it with BiometricPrompt. The outcome is an improved level of data security in this digital era.

##plugins.themes.bootstrap3.article.details##

Section
Articles
References
[1] E. M. De Los Reyes, A. M. Sison, and R. P. Medina, “File encryption based on reduced-round AES with revised round keys and key schedule,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 16, no. 2, pp. 897–905, 2019, doi: 10.11591/ijeecs.v16.i2.pp897-905.
[2] B. E. Widodo and A. S. Purnomo, “Implementasi Advanced Encryption Standard Pada Enkripsi Dan Dekripsi Dokumen Rahasia Ditintelkam Polda Diy,” Jurnal Teknik Informatika (Jutif), vol. 1, no. 2, pp. 69–77, 2020, doi: 10.20884/1.jutif.2020.1.2.21.
[3] D. Wong, Real-World Cryptography. Manning Publications, 2021.
[4] Binantara Parmadi, “Implementasi Algoritma Kriptografi Elgamal pada Data Text,” vol. 5, no. 1, 2017, [Online]. Available: http://jurnal.stiki.ac.id/J-INTECH/article/view/26
[5] P. L. T. Irawan, “Implementasi Teknik Kriptografi Stream Cipher Salsa20 Untuk Pengamanan Basis Data,” Smatika Jurnal, vol. 5, no. 02, pp. 88–92, 2015, [Online]. Available: http://jurnal.stiki.ac.id/SMATIKA/article/view/97
[6] D. Selent, “Advanced Encryption Standard,” Rivier Academic Journal, vol. 6, no. 2, 2010.
[7] A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, 2018, doi: 10.30864/eksplora.v8i1.139.
[8] K. Muttaqin and J. Rahmadoni, “Analysis and Design of File Security System Aes (Advanced Encryption Standard) Cryptography Based,” Journal of Applied Engineering and Technological Science, vol. 1, no. 2, pp. 113–123, 2020, doi: 10.37385/jaets.v1i2.78.
[9] E. Setyaningsih, “Keamanan file dokumen menggunakan algoritme Advanced Encryption Standard pada aplikasi berbasis Android,” Jnanaloka, pp. 11–23, Apr. 2020, doi: 10.36802/jnanaloka.2020.v1-no1-13.
[10] A. I. Suranta and D. V. S. Y. Sakti, “Penerapan Algoritma Aes (Advance Encryption Standart) 128 Untuk Enkripsi Dokumen Di Pt. Gunung Geulis Elok Abadi,” Skanika, vol. 5, no. 1, pp. 1–10, 2022, doi: 10.36080/skanika.v5i1.2118.
[11] Y. H. Jo, S. Y. Jeon, J. H. Im, and M. K. Lee, “Security analysis and improvement of fingerprint authentication for smartphones,” Mobile Information Systems, vol. 2016, no. Krait 400, 2016, doi: 10.1155/2016/8973828.
[12] S. Iqbal et al., “A novel mobile wallet model for elderly using fingerprint as authentication factor,” IEEE Access, vol. 8, pp. 177405–177423, 2020, doi: 10.1109/ACCESS.2020.3025429.
[13] M. Fahmi Shamsudin and N. Hidayah Ab Rahman, “An Authentication of Carpooling Apps Using OTP and Fingerprint,” Applied Information Technology And Computer Science, vol. 2, no. 1, pp. 1–10, 2021.
[14] B. Acharya and K. Sahu, “Software Development Life Cycle Models: A Review Paper,” International Journal of Advanced Research in Engineering and Technology, vol. 11, no. 12, pp. 169–176, 2020, doi: 10.34218/IJARET.11.12.2020.019.
[15] H. Himawan and M. Yanu F, Interface USER EXPERIENCE. 2020.
[16] N. Smyth, Android Studio 3.0 Development Essentials Android 8 Edition. Payload Media, 2017.
[17] R. B. D. Putra, E. S. Budi, and A. R. Kadafi, “Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android,” JURIKOM (Jurnal Riset Komputer), vol. 7, no. 3, p. 376, 2020, doi: 10.30865/jurikom.v7i3.2161.
[18] P. Kong, L. Li, J. Gao, K. Liu, T. F. Bissyandé, and J. Klein, “Automated testing of Android apps: A systematic literature review,” IEEE Trans Reliab, vol. 68, no. 1, pp. 45–66, 2019, doi: 10.1109/TR.2018.2865733.