How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm

Taronisokhi Zebua, Eferoni Ndruru

Abstract


The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key

Keywords


Cryptography, Key, Vegenere, Cipher, RC4+

Full Text:

PDF

References


E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta: Andi, 2015.

R. Munir. “Kriptografi Keamananâ€, Bandung: Informatika, 2011.

A. M. H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen,†J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.

B. Purnama, “Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher dengan Kunci Berlapisâ€, J. Media Processor, vol. 9, no. 3, pp.1-8, 2014.

F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.

T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,†Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, May 2018.

R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.

E. K. Nurnawati, “ANALISIS KRIPTOGRAFI MENGGUNAKAN ALGORITMA VIGENERE CIPHER DENGAN MODE OPERASI CIPHER BLOCK CHAINING (CBC),†in Seminar Nasional Aplikasi Sains dan Teknologi 2008 – IST AKPRIND Yogyakarta, 2008, pp. 266–272.

R. U. Marsal, F. Arnia, and R. Adriman, “ENKRIPSI DAN DEKRIPSI CITRA MENGGUNAKAN MODIFIKASI ALGORITMA VIGENERE CIPHER,†KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.

G. A. Pradipta, “Penerapan Kombinasi Metode Enkripsi Vigenere Chiper Dan Transposisi Pada Aplikasai Client Server Chatting,†J. Sist. DAN Inform., vol. 10, no. 2, pp. 119–127, 2016.

F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,†J. Phys. Conf. Ser., vol. 978, no. 1, 2018.




DOI: https://doi.org/10.30865/ijics.v3i2.1404

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Taronisokhi Zebua, Eferoni Ndruru

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by Universitas Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.