How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm
Abstract
Keywords
Full Text:
PDFReferences
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta: Andi, 2015.
R. Munir. “Kriptografi Keamananâ€, Bandung: Informatika, 2011.
A. M. H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen,†J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.
B. Purnama, “Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher dengan Kunci Berlapisâ€, J. Media Processor, vol. 9, no. 3, pp.1-8, 2014.
F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.
T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,†Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, May 2018.
R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.
E. K. Nurnawati, “ANALISIS KRIPTOGRAFI MENGGUNAKAN ALGORITMA VIGENERE CIPHER DENGAN MODE OPERASI CIPHER BLOCK CHAINING (CBC),†in Seminar Nasional Aplikasi Sains dan Teknologi 2008 – IST AKPRIND Yogyakarta, 2008, pp. 266–272.
R. U. Marsal, F. Arnia, and R. Adriman, “ENKRIPSI DAN DEKRIPSI CITRA MENGGUNAKAN MODIFIKASI ALGORITMA VIGENERE CIPHER,†KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
G. A. Pradipta, “Penerapan Kombinasi Metode Enkripsi Vigenere Chiper Dan Transposisi Pada Aplikasai Client Server Chatting,†J. Sist. DAN Inform., vol. 10, no. 2, pp. 119–127, 2016.
F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.
M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,†J. Phys. Conf. Ser., vol. 978, no. 1, 2018.
DOI: https://doi.org/10.30865/ijics.v3i2.1404
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Taronisokhi Zebua, Eferoni Ndruru

This work is licensed under a Creative Commons Attribution 4.0 International License.
The IJICS (International Journal of Informatics and Computer Science)
Published by Universitas Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

This work is licensed under a Creative Commons Attribution 4.0 International License.