Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion

Arif Budiman, Paradise Paradise


Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6


Vigenere Cipher, RC6, RC6 key expansion, One time pad


Tsauri, T. A., & Nurochman, N. (2018). Kriptanalisis Algoritma Vigenere Chiper Dengan Algoritma Genetika Untuk Penentuan Kata Kunci. JISKA (Jurnal Informatika Sunan Kalijaga), 2(2), 115-126

Pratama, G. M., & Tamatjita, E. N. (2015). Modifikasi algoritma vigenère cipher menggunakan metode Catalan number dan double columnar transposition. Compiler, 4(1)

Anas, I., Nanda, P. A., & Hidayat, A. (2018). Implementasi Algoritma Vigeneere Cipher dan GOST dalam Keamanan Data. SinkrOn, 2(2), 18-22

Subandi, A., Lydia, M. S., Sembiring, R. W., Zarlis, M., & Efendi, S. (2018, September). Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process. In IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012119). IOP Publishing

Rahim, R., Kurniasih, N., Mustamam, M., Andriany, L., Nasution, U., & Mu, A. H. (2018). Combination Vigenere Cipher and One Time Pad for Data Security. Int. J. Eng. Technol, 7(2.3), 92-94

Triandi, B., Ekadiansyah, E., Puspasari, R., Iwan, L. T., & Rahmad, F. (2018, August). Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions. In 2018 6th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE

Jamaluddin, J., Zarlis, M., & Tulus, T. (2018). Pengamanan Data dengan Kombinasi Teknik Kriptografi Rabin dan Teknik Steganografi Chaotic LSB

Widodo, A. P., Sarwoko, E. A., Suharto, E., & Siahaan, J. F. O. (2016). Pengamanan Data Foto Pada Perangkat Os Android Menggunakan Teknik Kriptografi Hill Cipher. JISKA (Jurnal Informatika Sunan Kalijaga), 1(2)

Kurniawan, D. (2018). Perencanaan Aplikasi Pengamanan Data Text Menggunakan Blowfish Dan RC6. Pelita Informatika: Informasi dan Informatika, 17(3)

Suhendar, A. S. S., Sajati, H., & Astuti, Y. (2013). Perancangan Algoritma Anggi (Aa) dengan Memanfaatkan Diffie-hellman dan Ronald Rivest (Rc4) untuk Membangun Sistem Keamanan Berbasis Port Knocking. Compiler, 2(2)

Article Metrics

Abstract view: 304 times
Download     : 194   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


  • There are currently no refbacks.