How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm
DOI:
https://doi.org/10.30865/ijics.v3i2.1404Keywords:
Cryptography, Key, Vegenere, Cipher, RC4Abstract
The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the keyReferences
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta: Andi, 2015.
R. Munir. “Kriptografi Keamananâ€, Bandung: Informatika, 2011.
A. M. H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen,†J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.
B. Purnama, “Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher dengan Kunci Berlapisâ€, J. Media Processor, vol. 9, no. 3, pp.1-8, 2014.
F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.
T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,†Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, May 2018.
R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.
E. K. Nurnawati, “ANALISIS KRIPTOGRAFI MENGGUNAKAN ALGORITMA VIGENERE CIPHER DENGAN MODE OPERASI CIPHER BLOCK CHAINING (CBC),†in Seminar Nasional Aplikasi Sains dan Teknologi 2008 – IST AKPRIND Yogyakarta, 2008, pp. 266–272.
R. U. Marsal, F. Arnia, and R. Adriman, “ENKRIPSI DAN DEKRIPSI CITRA MENGGUNAKAN MODIFIKASI ALGORITMA VIGENERE CIPHER,†KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
G. A. Pradipta, “Penerapan Kombinasi Metode Enkripsi Vigenere Chiper Dan Transposisi Pada Aplikasai Client Server Chatting,†J. Sist. DAN Inform., vol. 10, no. 2, pp. 119–127, 2016.
F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4 + algorithm , RC4 NGG algorithm and RC4 GGHN algorithm on image file security,†2nd Nommensen Int. Conf. Technol. Eng., pp. 1–7, 2018.
M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,†J. Phys. Conf. Ser., vol. 978, no. 1, 2018.


