Membangun Super Enkripsi untuk Mengamankan Pesan

Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah

Abstract


The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.


Keywords


Bifid Cipher; Decryption; Encryption; Super Encryption; Vigenere Cipher

Full Text:

PDF

References


H. Sahara, "Implementasi Pengamanan Pesan Chatting Menggunakan Metode Vigenere Cipher dan Cipher Block Chainning," Media Informasi Analisa dan Sistem(MEANS), vol. 3, pp. 166-193, 2018.

D. I. Manullang, "Perancangan Aplikasi Penyandian File Teks Dengan Algoritma Bifid Cipher," Jurnal Pelita Informatika, vol. 6, pp. 319-324, 2018.

R. A. M. d. F. A. Rafrastara, "Super Enkripsi Teks Kriptografi Menggunakan Algoritma Hill Cipher dan Transposisi Kolom," Prosiding SENDI_U , pp. 85-92, 2019.

R. K. P. P. d. F. Latifah, "Implementasi Enkripsi Dekripsi Pesan Teks Menggunakan Model Julius Caesar Berbasis Object Oriented Programme," Jurnal Techno Nusa Mandiri, vol. 11, pp. 17-26, 2014.

S. Aprilia, "Pengamanan Data Informasi Menggunakan Kriptografi Klasik," Jurnal Teknik Informatika UIN Sunan Gunung Djati, vol. 10, pp. 160-167, 2005.

K. Y. d. H. S. H. Muhammad Lutfi Wijaya, "Kriptografi dengan Komposisi Caesar Cipher dan Affine Cipher untuk Mengubah Pesan Rahasia," EurekaMatika, vol. 5, pp. 30-45, 2017.

D. Ariyus, Kriptografi Keamanan Data dan Komunikasi, Yogyakarta: Graha Ilmu, 2006.

D. Arius, Pengantar Ilmu Kriptografi Teori Analisis dan Implementasi, Yogyakarta: C.V Andi Offset, 2008.

R. Sadikin, Kriptografi untuk Keamanan Jaringan, Yogyakarta: C.V Andi Offset, 2012.

M. A. M. d. N. P. Sastra, "Efektivitas Pesan Teks dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi," Majalah Ilmiah Teknologi Elektro, vol. 17, pp. 59-65, 2018.

A. K. Quist, "A Hybrid Cryptosystem Based on Vigenere Cipher and Columnar Transposition Cipher," International Journal of Advanced Tecnology & Engineering Research (IJATER), vol. 3, no. 1, pp. 141-147, 2013.

R. Munir, Kriptografi, Bandung: Informatika Bandung, 2019.

S. Wulandari, "Pengamanan Pesan Teks E-Mail Menggunakan Metode Algoritma Bifid dan Feedback Cipher," Jurnal Riset Komputer (JURIKOM), vol. 6, pp. 523-530, 2019.

D. Susanti, "Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks," Indonesian Journal of Data and Science, vol. 1, pp. 11-18, 2020.

J. Enterprise, Python untuk Programmer Pemula, Jakarta: PT. Elex Media Komputindo, 2019.




DOI: https://doi.org/10.18860/jrmm.v2i4.14470

Refbacks

  • There are currently no refbacks.