Text Security Using Vigenere Cipher and Hill Cipher

Lekso Budi Handoko, Abdussalam Abdussalam

Abstract


Data security in the system is a problem that until now has made researchers continue to develop science. cryptography as a data security technique, especially in text data through the implementation of classical cryptography. In this research, a combination of vigenere and hill cipher has been implemented. Both algorithms are algorithms that are easy to implement, but each has its drawbacks. Vigenere is easy to brute force, while hill cipher in the decryption process must use a reversible key so that not all keys are suitable for use. The combination of Vigenere and hill cipher has been implemented and tested using black box testing and the calculation of the Avalanche Effect. Tests using the Avalanche Effect resulted in an average value of 52,46%.

Keywords


Cryptography; Vigenere Cipher; Hill Cipher; Text

Full Text:

PDF (Indonesian)

References


E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.

M. M. Amin, “Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks,” Pseudocode, vol. 3, no. 2, pp. 129–136, 2017.

Kurniawan, I. A. Siradjuddin, and A. Muntasa, “Keamanan Citra Dengan Watermarking Menggunakan Pengembangan Algoritma Least Significant Bit,” J. Inform., vol. 13, no. 1, pp. 9–14, 2016.

M. Natsir, “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java,” J. Format, vol. 6, no. 1, pp. 87–105, 2017.

C. A. Sari, W. S. Sari, and B. Sugiarto, “IMPERCEPTIBLE KRIPTOGRAFI CITRA BERWARNA MENGGUNAKAN RIVEST SHAMIR ADLEMAN,” in Proceeding SENDIU 2021, 2021, pp. 978–979.

C. A. Sari, E. H. Rachmawanto, and E. J. Kusuma, “Good Performance Image Encryption Using Selective Bit T-DES on Inverted LSB Steganography,” J. Ilmu Komput. dan Inf., vol. 12, no. 1, pp. 41–29, 2019.

Jamaludin, “Rancang Bangun Kombinasi Chaisar Cipher dan Vigenere Cipher Dalam Pengembangan Algoritma Kriptografi Klasik,” in Seminar Nasional Teknologi Informasi (Semantika), 2017, no. The Future of Computer Vision, pp. 234–243.

G. A. Pradipta, “Penerapan Kombinasi Metode Enkripsi Vigenere Chiper Dan Transposisi Pada Aplikasai Client Server Chatting,” J. Sist. dan Inform., vol. 10, no. 2, pp. 119–127, 2016.

C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,” J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.

A. Susanto, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, R. R. Ali, and I. U. Wahyu Mulyono, “Dual Security Method for Digital Image using HBV Encryption and Least Significant Bit Steganography,” in Journal of Physics: Conference Series, 2019, vol. 1201, no. 1.

F. Al Isfahani and F. Nugraha, “Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK,” Sci. Comput. Sci. Informatics J., pp. 1–8, 2019.

A. Blair, “Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination,” in 2013 IEEE Congress on Evolutionary Computation, 2013, pp. 605–612.

R. Damara Ardy, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5),” in Proceeding of 2017 International Conference on Smart Cities, Automation and Intelligent Computing Systems, ICON-SONICS 2017, 2018, vol. 2018-Janua.

P. Subhasri and A. Padmapriya, “Enhancing the security of dicom content using modified vigenere cipher,” Int. J. Appl. Eng. Res., vol. 10, no. 55, pp. 1951–1956, 2015.

S. Hraoui, F. Gmira, M. F. Abbou, A. J. Oulidi, and A. Jarjar, “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm,” Procedia Comput. Sci., vol. 148, pp. 399–408, 2019.

M. Essaid, I. Akharraz, A. Saaidi, and et A. Mouhib, “Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps,” J. Inf. Secur. Appl., vol. 47, pp. 173–187, Aug. 2019.

O. E. Omolara, A. I. Oludare, and S. E. Abdulahi, “Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication,” Comput. Eng. Intell. Syst., vol. 5, no. 5, pp. 2222–1719, 2014.

P. Witoolkollachit, “The avalanche effect of various hash functions between encrypted raw images versus non-encrypted images : A comparison study,” J. Thai Med. Informatics Assoc., vol. 1, pp. 69–82, 2016.




DOI: http://dx.doi.org/10.36080/bit.v19i1.1790

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Jurnal Bit (Budi Luhur Information Technology)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


OFFICE:

FAKULTAS TEKNOLOGI INFORMASI - UNIVERSITAS BUDI LUHUR, Jl. Ciledug Raya, Petukangan Utara, Jakarta Selatan, 12260. DKI Jakarta, Indonesia. Telp: 021-585 3753 Fax: 021-585 3752

Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) by FAKULTAS TEKNOLOGI INFORMASI - UNIVERSITAS BUDI LUHUR is licensed under CC BY-SA 4.0 Creative Commons License

View Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Satats Web Analytics Made Easy