Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text
DOI:
https://doi.org/10.30865/ijics.v2i1.997Abstract
Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimalReferences
E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher,†J. Teknol., vol. 2, no. 2, pp. 213–219, 2009.
N. Widyastuti, “Pengembangan Metode Beaufort Cipher Menggunakan Pembangkit Kunci Chaos,†J. Teknol., vol. 7, no. 1, pp. 73–82, 2014.
W. Stallings, Cryptography and Network Security, V. New York: Prentice Hall, 2011.
M. E Saleh, A. A. Aly, and F. A. Omara, “Data Security Using Cryptography and Steganography Techniques,†Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 6, pp. 390–397, 2016.
T. Zebua, “Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1,†in Seminar Nasional Inovasi dan Teknologi (SNITI), 2015, pp. 85–89.
A. Latif, “Implementasi Kriptografi Menggunakan Metode Advance Encryption Standard (AES) untuk Pengamanan Data Teks,†J. Ilm. Mustek Anim Ha, vol. 4, no. 2, pp. 163–172, 2015.
A. A. Lubis, N. P. Wong, I. Arfiandi, V. I. Damanik, and A. Maulana, “Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher,†JSM Mikro Ski., vol. 16, no. 2, pp. 125–134, 2015.
M. Linda Caroline, “Metode Enkripsi Baru : Triple Transposition Vigènere Cipher,†Bandung, 2011.
D. Rosmala and R. Aprian, “Implementasi Mode Operasi Cipher Block Chaining ( CBC ),†J. Inform., vol. 3, no. 2, pp. 55–66, 2012.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: Andi, 2015.


