Pembangkitan Kunci pada Algoritma Hill Cipher menggunakan Teknik Distribusi Angka Diffie-Hellman

Authors

  • Andysah Putera Utama Siahaan Universitas Pembangunan Panca Budi, Medan

DOI:

https://doi.org/10.30865/komik.v6i1.5775

Keywords:

Hill Cipher, Diffie-Hellman, distribution, encryption, decryption

Abstract

Sending data needs to be done properly and safely because it involves important information owned by a person, company or certain party. Sending messages often uses passwords or keywords so that the sending process goes well. The recipient of the message must have the password to be able to open the message after it is received. The key exchange causes the key to be known by irresponsible parties. The key generation process using the Diffie-Hellman algorithm is a good technique to avoid key exchange between sender and receiver. This study uses the Hill Cipher algorithm to test the generation of four keys which will be placed in a 2 x 2 key matrix. As a result, each key that will be generated will use the Diffie-Hellman technique in determining the value to be entered into the Hill Cipher key matrix. The use of this technique is very well done in providing the Hill Cipher algorithm key to the recipient of the message so that it can open the message sent by the sender.

References

D. Kurnia, H. Dafitri, A. P. U. Siahaan, Sugianto, and Mardiana, “RSA 32-bit Implementation Technique,†Int. J. Recent Trends Eng. Res., vol. 3, no. 7, pp. 279–284, Jul. 2017, doi: 10.23883/IJRTER.2017.3359.UXAIW.

A. Kamsyakawuni, Fanani, A. Husnan, and A. Riski, “Pengamanan Citra dengan Algoritma Diffie-Hellman dan Algoritma Simplified Data Encryption Standard (S-DES),†J. Ilm. Mat. dan Pendidik. Mat., vol. 10, no. 2, pp. 63–80, 2018.

A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,†Int. J. Sci. Res., vol. 5, no. 7, pp. 1149–1152, 2016.

A. I. Permana, T. Tulus, and Z. Situmorang, “Combination of One Time Pad Cryptography Algorithm with Generate Random Keys and Vigenere Cipher with EM2B KEY,†2020, doi: 10.4108/eai.3-8-2019.2290723.

V. S. Ginting, “Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa,†J. Teknol. Inf., vol. 4, no. 2, pp. 241–246, 2020, doi: 10.36294/jurti.v4i2.1365.

A. Serdano, M. Zarlis, Sawaluddin, and D. Hartama, “Pengamanan Pesan Menggunakan Algoritma Hill Cipher Dalam Keamanan Komputer,†J. Mahajana Inf., vol. 4, no. 2, pp. 1–5, 2019.

Y. W. Hasibuan, R. B. Veronica, J. Matematika, U. N. Semarang, K. S. Gunungpati, and I. Artikel, “How to Cite,†vol. 11, no. 1, pp. 54–68, 2022.

A. Manaor, H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi,†J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.

A. Wahyuni, “Keamanan Pertukaran Kunci Kriptografi dengan Algoritma Hybrid : Diffie-Hellman dan RSA,†Maj. Ilm. Inform., vol. 2, no. 2, pp. 15–23, 2011.

Purwadi, H. Jaya, and A. Calam, “Aplikasi Kriptografi Asimetris dengan Metode Diffie-Hellman dan Algoritma ElGamal untuk Keamanan Teks,†J. Ilm. Saintikom, vol. 13, no. 3, pp. 183–196, 2014.

W. Diffie and M. E. Hellman, “New Directions in Cryptography,†IEEE Trans. Inf. Theory., vol. 22, no. 6, pp. 644–654, 1976.

Abdul Halim Hasugian, “Implementasi Algoritma Hill Cipher Dalam Penyandian Data,†Pelita Inform. Budi Darma, vol. IV, no. 2, pp. 115–122, 2013.

Downloads

Published

2023-02-11