Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text

 (*)Fitarius Humendru Mail (STMIK Budi Darma, Indonesia)
 Taronisokhi Zebua (STMIK Budi Darma, Indonesia)

(*) Corresponding Author

DOI: http://dx.doi.org/10.30865/ijics.v2i1.997

Abstract

Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal

Full Text:

PDF


Article Metrics

Abstract view : 320 times
PDF - 107 times

References

E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher,” J. Teknol., vol. 2, no. 2, pp. 213–219, 2009.

N. Widyastuti, “Pengembangan Metode Beaufort Cipher Menggunakan Pembangkit Kunci Chaos,” J. Teknol., vol. 7, no. 1, pp. 73–82, 2014.

W. Stallings, Cryptography and Network Security, V. New York: Prentice Hall, 2011.

M. E Saleh, A. A. Aly, and F. A. Omara, “Data Security Using Cryptography and Steganography Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 6, pp. 390–397, 2016.

T. Zebua, “Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1,” in Seminar Nasional Inovasi dan Teknologi (SNITI), 2015, pp. 85–89.

A. Latif, “Implementasi Kriptografi Menggunakan Metode Advance Encryption Standard (AES) untuk Pengamanan Data Teks,” J. Ilm. Mustek Anim Ha, vol. 4, no. 2, pp. 163–172, 2015.

A. A. Lubis, N. P. Wong, I. Arfiandi, V. I. Damanik, and A. Maulana, “Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher,” JSM Mikro Ski., vol. 16, no. 2, pp. 125–134, 2015.

M. Linda Caroline, “Metode Enkripsi Baru : Triple Transposition Vigènere Cipher,” Bandung, 2011.

D. Rosmala and R. Aprian, “Implementasi Mode Operasi Cipher Block Chaining ( CBC ),” J. Inform., vol. 3, no. 2, pp. 55–66, 2012.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: Andi, 2015.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Fitarius Humendru, Taronisokhi Zebua

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by STMIK Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.