Implementation of a Hybrid Cryptosystem Using ChaCha20 and ECC for Image Encryption in an Android Application
DOI:
10.33395/sinkron.v9i4.15274Keywords:
Android, ChaCha20, ECC, Hybrid Cryptography, Image encryptionAbstract
This study aims to develop an Android application capable of securely encrypting and decrypting images using a hybrid cryptographic method. The system combines the ChaCha20 algorithm as symmetric cryptography to encrypt image files, and Elliptic Curve Cryptography (ECC) as asymmetric cryptography to encrypt the ChaCha20 key. The key used is temporary (ephemeral), ensuring that only the intended recipient who possesses the appropriate ECC private key can decrypt the file. The application was developed using the Kotlin programming language in Android Studio, with a PHP-based backend and MySQL database. Testing was conducted using the black-box method and involved 15 beta testers to evaluate functionality, security, and usability aspects. The results show that all features of the application run properly, and the encryption and decryption processes can be performed efficiently and securely. Beta testers gave an average rating of 4.6 out of 5 and stated that the application is easy to use and provides sufficient protection for personal data. Therefore, the developed application successfully meets the objectives of the study and offers an alternative solution for securing image file transfers between users via Android devices.
Downloads
References
Alfiyan, M. N. (2024, May 15). Kebocoran Data Pemilih 2024 Terkena Sanksi DKPP, KPU: Kita Terima. FTNews. https://www.ftnews.co.id/public/kebocoran-data-pemilih-2024-terkena-sanksi-dkpp-kpu-kita-terima
Alhamdi, A. T. F., & Siahaan, R. F. (2021). Penerapan Kriptografi Dalam Pengamanan Pesan Text Berbasis ANDROID Dengan Menggunakan Metode Rijndael. JURNAL MAHAJANA INFORMASI, 6(2), 69–74. https://doi.org/10.51544/jurnalmi.v6i2.2448
Desyani, T., Saifudin, A., Altamerano, H. R., Gunantio, S., Al-Rasyid, S., & Saputra, Y. E. Pengembangan Sistem Pemantauan Cryptocurrency Berbasis Web Menggunakan Metode Waterfall.
Menora, T., Primasari, C. H., Wibisono, Y. P., Sidhi, T. A. P., Setyohadi, D. B., & Cininta, M. (2023). Implementasi Pengujian Alpha dan Beta Testing Pada Aplikasi Gamelan Virtual Reality. KONSTELASI: Konvergensi Teknologi dan Sistem Informasi, 3(1), 48-60.
Perdana, D., Purwiko, P., Dewanta, F., & Afianti, F. (2022). Analisa Penggunaan Elliptic Curve Cryptography pada Sistem Autentikasi pada Internet of Things.
Putranto Saptohutomo, A. (2023, July 6). Data 34 Juta Paspor WNI Bocor Dianggap Kesalahan Konyol. KOMPAS.Com. https://nasional.kompas.com/read/2023/07/06/18401011/data-34-juta-paspor-wni-bocor-dianggap-kesalahan-konyol?page=all
Putu, I., Brama, A., Negara, P. C., Naufal, M., Abror, N., & Tarigan, N. R. (2025). STUDI LITERATUR MENGENAI KINERJA BLOWFISH, AES, CHACHA20, DAN GCM DALAM SISTEM KEAMANAN DATA. Jurnal Matematika Dan Ilmu Pengetahuan Alam, 6. https://doi.org/10.3483/trigonometri.v1i1.800
Rahim, F., Ramadhan Nasution, Y., & Supiyandi. (2024). Implementasi Algoritma ChaCha20 Pada Pengamanan File Citra Bitmap.
Rakhmadi Rahman, Khumaedi Khumaedi, & Nugrah Surya Pratama. (2024). Peningkatan Keamanan Data dengan Kriptografi Modern pada Sistem Operasi. Jurnal Sistem Informasi Dan Ilmu Komputer, 2(4), 01–08. https://doi.org/10.59581/jusiik-widyakarya.v2i3.3995
Rilo Taqwa, A., & Haryo Sulaksono, D. (2020). IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING BERBASIS ANDROID. In Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika (KERNEL) (Vol. 1, Issue 1).
Safitri, K., & Rastika, I. (2024, September 24). Oknum Guru Honorer yang Jual Data BKN Raup Keuntungan Rp 121 Juta. KOMPAS.Com. https://nasional.kompas.com/read/2024/09/24/16093191/a-guru-honorer-yang-jual-data-bkn-raup-keuntungan-rp-121-juta
Setyawan, A. B., Khaerudin, M., & Setiawati, S. (2024). Perancangan Aplikasi Enkripsi Dan Dekripsi Gambar Cetak Biru Pada PT. Patco Elektronik Teknologi Menggunakan Algoritma RSA Berbasis ANDROID. https://doi.org/10.25134/ilkom.v18i2.145
Wahyudi, E., Ardhianto, E., Handoko, W., Murti, H., Supriyanto, E., Lestariningsih, E., & Redjeki, R. (2024). Peningkatan Keamanan Data Melalui Teknik Super Enkripsi Menggunakan Algoritma Vigenere dan Caesar. Jurnal Informatika Polinema, 10(3), 315–322. https://doi.org/10.33795/jip.v10i3.5131
Wahyudi, T. (2022). Pengembangan Aplikasi Berbasis Web dan ANDROID Sebagai Penunjang Kerja di Indonesia: Systematic Literature Review. Journal Computer Science, 1(2). https://scholar.google.co.id/.
Widarma, A. (2023). Kombinasi Algoritma Simetri dan ECC untuk Meningkatkan Keamanan Pesan. 8(1). http://bit.ly/InfoTekJar
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2025 Samuel Anaya Putra Zai, Debi Yandra Niska, Zulfahmi Indra, Kana Saputra, Adidtya Perdana

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.