Implementasi vigenere cipher 128 dan rotasi bujursangkar untuk pengamanan teks

Implementation of vigenere cipher 128 and square rotation in securing text messages

*Rihartanto Rihartanto orcid scopus  -  Department of Information Technology, Politeknik Negeri Samarinda, Indonesia
Riris Kurnia Ningsih  -  Department of Information Technology, Politeknik Negeri Samarinda, Indonesia
Achmad Fanany Onnilita Gaffar scopus  -  Department of Information Technology, Politeknik Negeri Samarinda, Indonesia
Didi Susilo Budi Utomo scopus  -  Department of Information Technology, Politeknik Negeri Samarinda, Indonesia
Received: 24 Aug 2019; Revised: 28 Apr 2020; Accepted: 6 May 2020; Published: 31 Jul 2020; Available online: 23 May 2020.
Open Access Copyright (c) 2020 Jurnal Teknologi dan Sistem Komputer
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Article Info
Section: Original Research Articles
Language: ID
Statistics: 229 45
Information that can be in the form of text, image, audio, and video, is a valuable asset that needs to be secured from unauthorized parties. This research aims to study the implementation of Vigenere cipher 128 (VC-128) and square rotation to secure text information. The square rotation is applied to increase the security of the encryption results obtained from VC-128. The randomness of the rotation results was measured using Shannon entropy based on the distance between characters, and the Avalanche Effect measured changes in the encryption results compared to the original text. The square rotation can increase the randomness of the VC-128 encryption results, as indicated by an increase in entropy values. The highest increase in entropy of 34.8 % occurs in repetitive texts with the square size that produces optimal entropy was a 9x9 medium-size square. The Avalanche effect for each test data shows inconsistent results ranging from 44.5 % to 49 %.
Keywords: encryption optimization; square rotation; Vigenere cipher; Shannon entropy;Avalanche effect

Article Metrics:

  1. S. A. Hannan and A. M. A. M. Asif, “Analysis of polyalphabetic transposition cipher techniques used for encryption and decryption,” International Journal of Computer Science and Software Engineering, vol. 6, no. 2, pp. 41-46, 2017.
  2. H. Delfs, K. Paterson, and R. Cramer, Introduction to cryptography: principles and application, third edition. Berlin: Springer-Verlag GmnH, 2015.
  3. A. E. Handoyo, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA,” Jurnal Teknologi dan Sistem Komputer, vol. 6, no. 1, pp. 37-43, 2018. doi: 10.14710/jtsiskom.6.1.2018.37-43
  4. R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,” International Journal of Engineering & Technoogy., vol. 7, no. 1.5, pp. 107–110, 2018. doi: 10.14419/ijet.v7i1.5.9130
  5. A. Rizal, D. S. B. Utomo, R. Rihartanto, and M. E. Hiswati, “Modified key using multi-cycle key in vigenere cipher,” International Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 2600–2606, 2019. doi: 10.35940/ijrte.B1313.0982S1119
  6. A. Priyam, “Extended vigenère using double transposition cipher with one time pad cipher,” International Journal of Engineering, Science and Advanced Reaserch, vol. 1, no. 2, pp. 62–65, 2015.
  7. A. Susanto, T. Khotimah, M. T. Sumadi, J. Warsito, and R. Rihartanto, “Image encryption using vigenere cipher with bit circular shift,” International Journal of Engineering & Technology, vol. 7, no. 2.2 (2018), pp. 62–64, 2018. doi: 10.14419/ijet.v7i2.2.12734
  8. I. Saputra, M. Mesran, N. A. Hasibuan, and R. Rahim, “Vigenere cipher algorithm with grayscale image key generator for secure text file,” International Journal of Engineering Research & Technology, vol. 6, no. 01, pp. 266–269, 2017.
  9. A. K. Bhateja, A. Bhateja, S. Chaudhury, and P. K. Saxena, “Cryptanalysis of vigenere cipher using cuckoo search,” Applied Soft Computing, vol. 26, pp. 315–324, 2015. doi: 10.1016/j.asoc.2014.10.004
  10. A. Bhateja and S. Kumar, “Genetic algorithm with elitism for cryptanalysis of vigenere cipher,” in International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, Feb. 2014, pp. 373–377. doi: 10.1109/ICICICT.2014.6781311
  11. N. Sinha and K. Bhamidipati, “Improving security of vigenère cipher by double columnar transposition,” Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014, doi: 10.5120/17591-8290
  12. S. K. Mandal and A. R. Deepti, “A cryptosystem based on vigenere cipher by using multilevel encryption scheme,” International Journal of Computer Science and Information Technologies, vol. 7, no. 4, pp. 2096–2099, 2016.
  13. S. Rubinstein-Salzedo, “The vigenere cipher,” in Cryptography. Springer Undergraduate Mathematics Series, Gewerbestrasse: Springer International Publishing AG, 2018. doi: 10.1007/978-3-319-94818-8
  14. T. O. Kvålseth, “On the measurement of randomness (uncertainty): A more informative entropy,” Entropy, vol. 18, no. 5, pp. 1–15, 2016. doi: 10.3390/e18050159.doi: 10.3390/e18050159
  15. Sugiyanto and R. K. Hapsari, “Pengembangan algoritma advanced encryption standard pada sistem keamanan SMS berbasis Android menggunakan algoritma vigenere,” Ultimatics: Jurnal Teknik Informatika, vol. 8, no. 2, pp. 131–138, 2016. doi: 10.31937/ti.v8i2.528

No citation recorded.