How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm

 (*)Taronisokhi Zebua Mail (AMIK Stiekom Sumatera Utara, Indonesia)
 Eferoni Ndruru (STMIK Budi Darma, Indonesia)

(*) Corresponding Author

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key

Keywords


Cryptography, Key, Vegenere, Cipher, RC4+

Full Text:

PDF


Article Metrics

Abstract view : 464 times
PDF - 313 times

References

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta: Andi, 2015.

R. Munir. “Kriptografi Keamanan”, Bandung: Informatika, 2011.

A. M. H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen,” J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.

B. Purnama, “Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher dengan Kunci Berlapis”, J. Media Processor, vol. 9, no. 3, pp.1-8, 2014.

F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,” 2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.

T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, May 2018.

R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.

E. K. Nurnawati, “ANALISIS KRIPTOGRAFI MENGGUNAKAN ALGORITMA VIGENERE CIPHER DENGAN MODE OPERASI CIPHER BLOCK CHAINING (CBC),” in Seminar Nasional Aplikasi Sains dan Teknologi 2008 – IST AKPRIND Yogyakarta, 2008, pp. 266–272.

R. U. Marsal, F. Arnia, and R. Adriman, “ENKRIPSI DAN DEKRIPSI CITRA MENGGUNAKAN MODIFIKASI ALGORITMA VIGENERE CIPHER,” KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.

G. A. Pradipta, “Penerapan Kombinasi Metode Enkripsi Vigenere Chiper Dan Transposisi Pada Aplikasai Client Server Chatting,” J. Sist. DAN Inform., vol. 10, no. 2, pp. 119–127, 2016.

F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,” 2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Taronisokhi Zebua, Eferoni Ndruru

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by STMIK Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.