Department of Information Technology, Politeknik Negeri Samarinda, Indonesia
BibTex Citation Data :
@article{JTSISKOM13476, author = {Rihartanto Rihartanto and Riris Kurnia Ningsih and Achmad Fanany Onnilita Gaffar and Didi Susilo Budi Utomo}, title = {Implementasi vigenere cipher 128 dan rotasi bujursangkar untuk pengamanan teks}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {8}, number = {3}, year = {2020}, keywords = {encryption optimization; square rotation; Vigenere cipher; Shannon entropy;Avalanche effect}, abstract = {Information that can be in the form of text, image, audio, and video, is a valuable asset that needs to be secured from unauthorized parties. This research aims to study the implementation of Vigenere cipher 128 (VC-128) and square rotation to secure text information. The square rotation is applied to increase the security of the encryption results obtained from VC-128. The randomness of the rotation results was measured using Shannon entropy based on the distance between characters, and the Avalanche Effect measured changes in the encryption results compared to the original text. The square rotation can increase the randomness of the VC-128 encryption results, as indicated by an increase in entropy values. The highest increase in entropy of 34.8 % occurs in repetitive texts with the square size that produces optimal entropy was a 9x9 medium-size square. The Avalanche effect for each test data shows inconsistent results ranging from 44.5 % to 49 %.}, issn = {2338-0403}, pages = {201--209} doi = {10.14710/jtsiskom.2020.13476}, url = {https://jtsiskom.undip.ac.id/article/view/13476} }
Refworks Citation Data :
Article Metrics:
Last update:
Last update: 2024-11-22 05:54:20
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.