- S. A. Hannan and A. M. A. M. Asif, “Analysis of polyalphabetic transposition cipher techniques used for encryption and decryption,” International Journal of Computer Science and Software Engineering, vol. 6, no. 2, pp. 41-46, 2017
- H. Delfs, K. Paterson, and R. Cramer, Introduction to cryptography: principles and application, third edition. Berlin: Springer-Verlag GmnH, 2015
- A. E. Handoyo, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA,” Jurnal Teknologi dan Sistem Komputer, vol. 6, no. 1, pp. 37-43, 2018. doi: 10.14710/jtsiskom.6.1.2018.37-43
- R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,” International Journal of Engineering & Technoogy., vol. 7, no. 1.5, pp. 107–110, 2018. doi: 10.14419/ijet.v7i1.5.9130
- A. Rizal, D. S. B. Utomo, R. Rihartanto, and M. E. Hiswati, “Modified key using multi-cycle key in vigenere cipher,” International Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 2600–2606, 2019. doi: 10.35940/ijrte.B1313.0982S1119
- A. Priyam, “Extended vigenère using double transposition cipher with one time pad cipher,” International Journal of Engineering, Science and Advanced Reaserch, vol. 1, no. 2, pp. 62–65, 2015
- A. Susanto, T. Khotimah, M. T. Sumadi, J. Warsito, and R. Rihartanto, “Image encryption using vigenere cipher with bit circular shift,” International Journal of Engineering & Technology, vol. 7, no. 2.2 (2018), pp. 62–64, 2018. doi: 10.14419/ijet.v7i2.2.12734
- I. Saputra, M. Mesran, N. A. Hasibuan, and R. Rahim, “Vigenere cipher algorithm with grayscale image key generator for secure text file,” International Journal of Engineering Research & Technology, vol. 6, no. 01, pp. 266–269, 2017
- A. K. Bhateja, A. Bhateja, S. Chaudhury, and P. K. Saxena, “Cryptanalysis of vigenere cipher using cuckoo search,” Applied Soft Computing, vol. 26, pp. 315–324, 2015. doi: 10.1016/j.asoc.2014.10.004
- A. Bhateja and S. Kumar, “Genetic algorithm with elitism for cryptanalysis of vigenere cipher,” in International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, Feb. 2014, pp. 373–377. doi: 10.1109/ICICICT.2014.6781311
- N. Sinha and K. Bhamidipati, “Improving security of vigenère cipher by double columnar transposition,” Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014, doi: 10.5120/17591-8290
- S. K. Mandal and A. R. Deepti, “A cryptosystem based on vigenere cipher by using multilevel encryption scheme,” International Journal of Computer Science and Information Technologies, vol. 7, no. 4, pp. 2096–2099, 2016
- S. Rubinstein-Salzedo, “The vigenere cipher,” in Cryptography. Springer Undergraduate Mathematics Series, Gewerbestrasse: Springer International Publishing AG, 2018. doi: 10.1007/978-3-319-94818-8
- T. O. Kvålseth, “On the measurement of randomness (uncertainty): A more informative entropy,” Entropy, vol. 18, no. 5, pp. 1–15, 2016. doi: 10.3390/e18050159.doi: 10.3390/e18050159
- Sugiyanto and R. K. Hapsari, “Pengembangan algoritma advanced encryption standard pada sistem keamanan SMS berbasis Android menggunakan algoritma vigenere,” Ultimatics: Jurnal Teknik Informatika, vol. 8, no. 2, pp. 131–138, 2016. doi: 10.31937/ti.v8i2.528
Last update:
No citation recorded.
Last update: 2025-04-30 17:38:56
No citation recorded.
Copyright (c) 2020 Jurnal Teknologi dan Sistem Komputer

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Teknologi dan Sistem Komputer).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.