Enkripsi dan Dekripsi Pesan Menggunakan Polinomial Galois Field dengan Algoritma Hill Cipher

Amelia Vega, Imam Sujarwo, Muhammad Khudzaifah


An information is extremely easy to obtain when technology is evolving so fast and it is important to secure the information to avoid irresponsible parties who want to abuse it. Messages that are not safe will harm the owner of the message, therefore a lot of research is related to message security. This study aims to deepen the message security in encoded form using Galois Field polynomials with one of the symmetric encryption algorithms, namely the Hill Cipher algorithm. Encryption is the process of converting a message into a secret code while decryption is the reverse process. The encryption and decryption process in this discussion is carried out by changing the message character into Galois Field polynomial form, then operating calculations based on the Hill Cipher algorithm, and then changing the results of the calculation operations into character form again. Based on the modifications have been made, the encryption and decryption formulas will be multiplied by modulo in polynomials form. In this study, the encryption and decryption keys are in matrix form with elements in it are members of the Galois Field polynomial and the result is a random message of 256 characters in binary bit-8. From this research, we gain insight into the encoding that can be done using polynomials which can be used later in other forms of encoding.


Galois Field; Hill Cipher; encoding


Kadir, Abdul. 2013. Pengantar Teknologi Informasi. Yogyakarta: Andi offset.

Whirfield Diffie, Martin E. Hellman. 1976. New Direction in Cryptography. California: Stanford.EE.

Rakhmat, effendi. 1993. Public Relations Dalam Teori dan Prakter. Jakarta: Gramedia Pustaka Umum.

Viswanath dkk. 2015. A Public Key Cryptosystem Using Hill’s Cipher. Jouurnal of Discrete Mathematical Science and Cryptography, 18(1) 129-138.

Heryana dkk. 2020. Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security. Buana Information Technology and Computer Sciences (BIT and CS), 1(2).

Ariyus, Dony. (2012). Pengantar Ilmu Kriptografi Teori, Analisis dan Implementasi. Yogyakarta: Penerbit Andi.

Tri Haryanto, A. dan Adi Sucipto T.L. 2013. Sistem Komputer. Jakarta: Politeknik Negeri Media Kreatif.

Mukhtar, Harun. 2018. Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish

Kurniawan, Yusuf. 2004. Kriptografi Keamanan Internet & Jaringan Komunikasi. Yogyakarta: Graha Ilmu.

Kromodimoeljo, Sentot. 2009. Teori dan Aplikasi Kriptografi. 2009. Jakarta: Andi Publisher.

Anton, H. dan Rorres C. 1998. Penerapan Aljabar Linear. Jakarta: Erlangga.

Padhye, S., Sahu, R.A., & Saraswat, V. 1991. Introduction to Cryptography. Florida: CRC Press

Sadikin, R. 2012. Kriptografi untuk Keamanan Jaringan. Yogyakarta: C.V Andi Offset.

Gazali, W. 2005. Matriks & Transformasi Linear. Yogyakarta: Graha Ilmu.

Munir, Rinaldi. 2008. Matematika Diskrit. Bandung: Informatika.

DOI: https://doi.org/10.18860/jrmm.v2i2.15150


  • There are currently no refbacks.