Analysis of the Effectiveness of End-to-End Encryption in Chatting Applications on User Data Security: A Systematic Literature Review

Authors

  • agung raharja Universitas Bandung Author

DOI:

https://doi.org/10.69933/0j09nj29

Keywords:

End-to-End Encryption, Chatting Applications, Data Security, Systematic Literature Review

Abstract

This research discusses the effectiveness of end-to-end encryption in messaging applications to maintain user data security. By using the Systematic Literature Review methodology, this research aims to contribute to the development of data encryption and security technology, especially in chatting applications, in order to provide a higher level of data protection for users. The findings of the selected studies show that end-to-end encryption significantly contributes to maintaining message confidentiality, preventing data theft, ensuring data integrity, increasing user security awareness, and improving communication efficiency. Although there are technical challenges such as performance impacts due to the encryption and decryption process, overall end-to-end encryption is considered a very effective method in protecting user data in chatting applications

Abstract

This research discusses the effectiveness of end-to-end encryption in messaging applications to maintain user data security. By using the Systematic Literature Review methodology, this research aims to contribute to the development of data encryption and security technology, especially in chatting applications, in order to provide a higher level of data protection for users. The findings of the selected studies show that end-to-end encryption significantly contributes to maintaining message confidentiality, preventing data theft, ensuring data integrity, increasing user security awareness, and improving communication efficiency. Although there are technical challenges such as performance impacts due to the encryption and decryption process, overall end-to-end encryption is considered a very effective method in protecting user data in chatting applications

Downloads

Download data is not yet available.

Author Biography

  • agung raharja, Universitas Bandung

    universitas bandung

References

A. R. Raharja, R. Setiyono, dan I. Hariyanti, “PERANCANGAN DAN IMPLEMENTASI CALIFORNIA BEARING RATIO (CBR) DENGAN MENGGUNAKAN C# DAN ARDUINO,” J. Responsif Ris. Sains dan Inform., vol. 6, no. 1, hal. 54–62, Feb 2024, doi: 10.51977/jti.v6i1.1425.

D. Ramalinda, M. H. Agung Rachmat Raharja, Sali Setiatin, dan J. Angga Pramudianto, PENGANTAR TEKNOLOGI INFORMASI PADA REKAM MEDIS. 2024.

Y. D. Putri et al., “Penerapan Kriptografi Caesar Cipher Pada Fitur Chatting Sistem Informasi Freelance Application of Caesar Cipher Criptography in Freelance,” vol. 2, no. 2, hal. 87–94, 2019.

I. Juniarmi, “Analisis Keamanan Data pada Aplikasi Chatting Menggunakan Enkripsi End-to-End,” Technol. J. J. Inform., vol. 1, no. 2, hal. 3046–9163, 2024, [Daring]. Tersedia pada: https://doi.org/10.62872/ppr42775.

Dewa Ayu Mutiara Kirana Praba Dewi, “Analisis Penggunaan HMAC-SHA256 pada Keamanan Aplikasi Chatting,” no. 18220084, 2023, [Daring]. Tersedia pada: https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi-dan-.

J. Jamaluddin, N. F. Saragih, R. J. Simamora, R. Siringoringo, dan E. N. Purba, “Konsep Pengamanan Video Conference Dengan Enkripsi Aes-Gcm Pada Aplikasi Zoom,” METHOMIKA J. Manaj. Inform. dan Komputerisasi Akunt., vol. 4, no. 2, hal. 109–113, 2021, doi: 10.46880/jmika.vol4no2.pp109-113.

Y. Sri Maharani, S. Trisdiatin, M. Rafli Ihsanuddin, dan F. Rahma, “SEMIOTIKA Seminar Nasional Teknologi Informasi dan Matematika Kekuatan Enkripsi End-to-End: Kajian Literatur Mengenai Kerahasiaan Komunikasi Digital dalam Aplikasi Pesan Instan,” vol. 2, no. 1, hal. 1–7, 2023.

U. Santria dan N. Arsoetar, “Penggunaan Enkripsi End-to-End dalam Pengamanan Pesan dan Video Call pada Whatsapp,” hal. 137–142, 2017, [Daring]. Tersedia pada: http://seminar.uny.ac.id/semnasmatematika/sites/seminar.uny.ac.id.semnasmatematika/files/full/T-21.pdf.

T. Sutisna, A. R. Raharja, E. Hariyadi, V. Hafizh, dan C. Putra, “Penggunaan Computer Vision untuk Menghitung Jumlah Kendaraan dengan Menggunakan Metode SSD ( Single Shoot Detector ),” vol. 4, hal. 6060–6067, 2024.

D. Priharsari, “Systematic Literature Review Di Bidang Sistem Informasi Dan Systematic Literature Review in Information Systems and Computer Engineering : a Guideline,” J. Teknol. Inf. dan Ilmu Komput., vol. 9, no. 2, hal. 263–268, 2022, doi: 10.25126/jtiik.202293884.

S. P. Lestari, H. N. Fadlan, R. Angelia Purba, dan I. Gunawan, “Realisasi Kriptografi Pada Fitur Enkripsi End-To-End Pesan Whatsapp,” J. Media Inform., vol. 4, no. 1, hal. 1–8, 2022, doi: 10.55338/jumin.v4i1.423.

G. V Liander, “Penggunaan Algoritma Elliptic Curve Diffie Hellman dan AES 256 pada Implementasi End-to-End Encryption WhatsApp,” Sumber, no. 18219075, 2022, [Daring]. Tersedia pada: https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi-dan-Koding/2021-2022/Makalah2022/Makalah-II4031-Kripto-2022 (14).pdf.

S. Khasanah dan T. Sutabri, “Analisis Pencegahan Pencurian Data Melalui Aplikasi Whatsapp Menggunakan Metode Kriptografi,” J. Sain dan Tek., vol. 5, no. 2, hal. 145–153, 2023.

G. Urva, “Analisis Penggunaan Enkripsi End To End Pada Aplikasi Whatsapp Messengger,” J. Unitek, vol. 10, no. 1, hal. 34–45, 2017, doi: 10.52072/unitek.v10i1.69.

Downloads

Published

30-06-2025

How to Cite

[1]
agung raharja , Tran., “Analysis of the Effectiveness of End-to-End Encryption in Chatting Applications on User Data Security: A Systematic Literature Review”, JOCSIT .. J. Collab. Sci. Informatics Technol., vol. 2, no. 1, Jun. 2025, doi: 10.69933/0j09nj29.

Share

Similar Articles

1-10 of 18

You may also start an advanced similarity search for this article.