Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)

Sukmawati Indah Safitri, Muhammad Khudzaifah, Mohammad Nafie Jauhari

Abstract


Classical and modern cryptography have advantages and disadvantages in securing text messages. Hybrid algorithms can combine two algorithms to produce a higher level of message security when compared to one type of algorithm. This study discusses a hybrid algorithm that combines Myszkowski Cipher and RSA. The purpose of this research is to obtain ciphertext that is more difficult to crack by cryptanalysis. The hybrid algorithm process is done by encrypting text messages with the Myszkowski Cipher algorithm then the key used in the Myszkowski Cipher algorithm are encrypted using the RSA algorithm with the equation . Then the ciphertext and cipherkey will be obtained in numerical. The decryption process is done by decrypting the cipherkey by specifying the value of  as the private key so that  using the equation . Next is by trying the value of  until a  value is obtained, after which decryption to the equation , then the process of decrypting ciphertext using Myszkowski Cipher can be done. The benefit of this research is can improve the security of messages because it applies the advantages of each algorithm in its encoding.


Keywords


hybrid; myszkowski cipher; algorithm; RSA

Full Text:

PDF

References


A. N. Agustina, Aryanti, and Nasron, “Pengamanan Dokumen Menggunakan Kombinasi Metode Rsa (Rivest Shamir Adleman) Dan Vigenere Cipher,” Pros. Semin. Nas. Multi Disiplin Ilmu Call Pap. UNISBANK, pp. 14–19, 2017.

R. Alvionita, “Implementasi Algoritma Super Enkripsi (Affine Cipher dan Route Cipher) pada Pesan Teks,” UNIVERSITAS ISLAM NEGERI MAULANA MALIK IBRAHIM MALANG, 2021.

Basri, “Pendekatan Kriptografi Hybrid pada Keamanan Dokumen Elektronik dan HypertextTransfer Protocol Secure (HTTPS) (Analisis Potensi Implementasi Pada Sistem Keamanan),” J. Ilmu Komput., vol. 1, no. 2, pp. 32–37, 2015.

O. Ekwardo, “Modifikasi Columnar transposition Menggunakan Sebuah Fungsi Transposisi,” Tek. Inform. ITB, pp. 1–4, 2018.

A. Ginting, R. R. Isnanto, and I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, pp. 253–258, 2015, [Online]. Available: https://media.neliti.com/media/publications/144706-ID-implementasi-algoritma-kriptografi-rsa-u.pdf.

D. B. Ginting, “Peranan Aritmetika Modulo dan Bilangan Prima pada Algoritma Kriptografi RSA (Rivest-Shamir-Adleman),” Media Inform., vol. 9, no. 2, pp. 48–57, 2010.

J. Jamaludin, “Rancang Bangun Kombinasi Hill Cipher dan RSA Menggunakan Metode Hybrid Cryptosystem,” Sink. J. dan Penelit. Tek. Inform., vol. 2, no. April 2018, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/139.

N. Khairina, “Modifikasi Myszkowski Transposition Cipher dengan Chess Board Pattern,” Pros. Semin. Nas. Teknol. Inform., vol. 2, no. 1, pp. 28–34, 2019.

J. Alda, P. Sikumbang, A. Fauzi, and H. Khair, “Penerapan Algoritma RSA Keamanan Pesan Teks Dengan Memanfaatkan Steganografi LSB ( Least Significant Bit ) Citra,” vol. 11, pp. 29–34, 2022.

S. Ling and C. Xing, Coding Theory A First Course. Cambridge University Press, 2004.

T. Rahajoeningroem and M. Aria, “Studi dan Implementasi Algoritma RSA untuk Pengamanan Data Transkrip Akademik Mahasiswa,” Maj. Ilm. Unikom, vol. 8, no. 1, pp. 77–90, 2011, [Online]. Available: http://jurnal.unikom.ac.id/_s/data/jurnal/v08-n01/volume-81-artikel-9.pdf/pdf/volume-81-artikel-9.pdf.

R. Y. Pohan, “Studi dan Perbadingan Berbagai Macam Algoritma Cipher Transposisi,” Informatika.Stei.Itb.Ac.Id, pp. 1–5, 2007, [Online]. Available: https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2007-2008/Makalah1/MakalahIF5054-2007-A-021.pdf.

Y. Reswan, U. Juhardi, and B. T. Yuliansyah, “Implementasi Kompilasi Algoritma Kriptografi Transposisi Columnar Dan Rsa Untuk Pengamanan Pesan Rahasia,” J. Inform. Upgris, vol. 4, no. 2, 2019, doi: 10.26877/jiu.v4i2.2812.

Q. Kester, “A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher,” Int. J. Adv. Technol. Eng. Res., vol. 3, no. 1, pp. 141–147, 2013.

J. A. Kusumaningtyas, “Analisa Algoritma Ciphers Transposition : Study Literature,” Multimatrix, vol. I, no. 1, pp. 1–12, 2018, [Online]. Available: http://jurnal.unw.ac.id:1254/index.php/mm/article/view/152/106.




DOI: https://doi.org/10.18860/jrmm.v2i6.22017

Refbacks

  • There are currently no refbacks.