Membangun Super Enkripsi untuk Mengamankan Pesan

Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah

Abstract


The issue of message security or an information is very important. A science that studies about securing the confidentiality of messages using passwords is called cryptography. To enhance security, two algorithms are combined to secure messages. Super encryption is a concept that uses a combination of two or more substitution and permutation (transposition) cryptography techniques to obtain an algorithm that is more difficult to crack. The first thing to do is to encrypt the message using a substitution technique (Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In this study, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipher and Bifid Cipher algorithms to secure messages. The message encryption process is using the Vigenere Cipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for the second encryption process. The encryption process is done the other way around, starting from the back of the encryption process. The combination of these two algorithms results in more secure message security.


Keywords


Bifid Cipher; Decryption; Encryption; Super Encryption; Vigenere Cipher

Full Text:

PDF

References


H. Sahara, "Implementasi Pengamanan Pesan Chatting Menggunakan Metode Vigenere Cipher dan Cipher Block Chainning," Media Informasi Analisa dan Sistem(MEANS), vol. 3, pp. 166-193, 2018.

D. I. Manullang, "Perancangan Aplikasi Penyandian File Teks Dengan Algoritma Bifid Cipher," Jurnal Pelita Informatika, vol. 6, pp. 319-324, 2018.

R. A. M. d. F. A. Rafrastara, "Super Enkripsi Teks Kriptografi Menggunakan Algoritma Hill Cipher dan Transposisi Kolom," Prosiding SENDI_U , pp. 85-92, 2019.

R. K. P. P. d. F. Latifah, "Implementasi Enkripsi Dekripsi Pesan Teks Menggunakan Model Julius Caesar Berbasis Object Oriented Programme," Jurnal Techno Nusa Mandiri, vol. 11, pp. 17-26, 2014.

S. Aprilia, "Pengamanan Data Informasi Menggunakan Kriptografi Klasik," Jurnal Teknik Informatika UIN Sunan Gunung Djati, vol. 10, pp. 160-167, 2005.

K. Y. d. H. S. H. Muhammad Lutfi Wijaya, "Kriptografi dengan Komposisi Caesar Cipher dan Affine Cipher untuk Mengubah Pesan Rahasia," EurekaMatika, vol. 5, pp. 30-45, 2017.

D. Ariyus, Kriptografi Keamanan Data dan Komunikasi, Yogyakarta: Graha Ilmu, 2006.

D. Arius, Pengantar Ilmu Kriptografi Teori Analisis dan Implementasi, Yogyakarta: C.V Andi Offset, 2008.

R. Sadikin, Kriptografi untuk Keamanan Jaringan, Yogyakarta: C.V Andi Offset, 2012.

M. A. M. d. N. P. Sastra, "Efektivitas Pesan Teks dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi," Majalah Ilmiah Teknologi Elektro, vol. 17, pp. 59-65, 2018.

A. K. Quist, "A Hybrid Cryptosystem Based on Vigenere Cipher and Columnar Transposition Cipher," International Journal of Advanced Tecnology & Engineering Research (IJATER), vol. 3, no. 1, pp. 141-147, 2013.

R. Munir, Kriptografi, Bandung: Informatika Bandung, 2019.

S. Wulandari, "Pengamanan Pesan Teks E-Mail Menggunakan Metode Algoritma Bifid dan Feedback Cipher," Jurnal Riset Komputer (JURIKOM), vol. 6, pp. 523-530, 2019.

D. Susanti, "Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks," Indonesian Journal of Data and Science, vol. 1, pp. 11-18, 2020.

J. Enterprise, Python untuk Programmer Pemula, Jakarta: PT. Elex Media Komputindo, 2019.




DOI: https://doi.org/10.18860/jrmm.v2i3.16335

Refbacks

  • There are currently no refbacks.