Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion
Submitted : 2019-07-23, Published : 2019-11-01.
Abstract
Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6
Keywords
Full Text:
PDF (Bahasa Indonesia)References
Tsauri, T. A., & Nurochman, N. (2018). Kriptanalisis Algoritma Vigenere Chiper Dengan Algoritma Genetika Untuk Penentuan Kata Kunci. JISKA (Jurnal Informatika Sunan Kalijaga), 2(2), 115-126
Pratama, G. M., & Tamatjita, E. N. (2015). Modifikasi algoritma vigenère cipher menggunakan metode Catalan number dan double columnar transposition. Compiler, 4(1)
Anas, I., Nanda, P. A., & Hidayat, A. (2018). Implementasi Algoritma Vigeneere Cipher dan GOST dalam Keamanan Data. SinkrOn, 2(2), 18-22
Subandi, A., Lydia, M. S., Sembiring, R. W., Zarlis, M., & Efendi, S. (2018, September). Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process. In IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012119). IOP Publishing
Rahim, R., Kurniasih, N., Mustamam, M., Andriany, L., Nasution, U., & Mu, A. H. (2018). Combination Vigenere Cipher and One Time Pad for Data Security. Int. J. Eng. Technol, 7(2.3), 92-94
Triandi, B., Ekadiansyah, E., Puspasari, R., Iwan, L. T., & Rahmad, F. (2018, August). Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions. In 2018 6th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE
Jamaluddin, J., Zarlis, M., & Tulus, T. (2018). Pengamanan Data dengan Kombinasi Teknik Kriptografi Rabin dan Teknik Steganografi Chaotic LSB
Widodo, A. P., Sarwoko, E. A., Suharto, E., & Siahaan, J. F. O. (2016). Pengamanan Data Foto Pada Perangkat Os Android Menggunakan Teknik Kriptografi Hill Cipher. JISKA (Jurnal Informatika Sunan Kalijaga), 1(2)
Kurniawan, D. (2018). Perencanaan Aplikasi Pengamanan Data Text Menggunakan Blowfish Dan RC6. Pelita Informatika: Informasi dan Informatika, 17(3)
Suhendar, A. S. S., Sajati, H., & Astuti, Y. (2013). Perancangan Algoritma Anggi (Aa) dengan Memanfaatkan Diffie-hellman dan Ronald Rivest (Rc4) untuk Membangun Sistem Keamanan Berbasis Port Knocking. Compiler, 2(2)
Article Metrics
Abstract view: 574 timesDownload  : 365 times
This work is licensed under a Creative Commons Attribution 4.0 International License.
Refbacks
- There are currently no refbacks.