Pembangkitan Kunci pada Algoritma Hill Cipher menggunakan Teknik Distribusi Angka Diffie-Hellman

 (*)Andysah Putera Utama Siahaan Mail (Universitas Pembangunan Panca Budi, Medan, Indonesia)

(*) Corresponding Author

Abstract

Sending data needs to be done properly and safely because it involves important information owned by a person, company or certain party. Sending messages often uses passwords or keywords so that the sending process goes well. The recipient of the message must have the password to be able to open the message after it is received. The key exchange causes the key to be known by irresponsible parties. The key generation process using the Diffie-Hellman algorithm is a good technique to avoid key exchange between sender and receiver. This study uses the Hill Cipher algorithm to test the generation of four keys which will be placed in a 2 x 2 key matrix. As a result, each key that will be generated will use the Diffie-Hellman technique in determining the value to be entered into the Hill Cipher key matrix. The use of this technique is very well done in providing the Hill Cipher algorithm key to the recipient of the message so that it can open the message sent by the sender.

Keywords


Hill Cipher, Diffie-Hellman, distribution, encryption, decryption

Full Text:

PDF


Article Metrics

Abstract view : 307 times
PDF - 109 times

References

D. Kurnia, H. Dafitri, A. P. U. Siahaan, Sugianto, and Mardiana, “RSA 32-bit Implementation Technique,” Int. J. Recent Trends Eng. Res., vol. 3, no. 7, pp. 279–284, Jul. 2017, doi: 10.23883/IJRTER.2017.3359.UXAIW.

A. Kamsyakawuni, Fanani, A. Husnan, and A. Riski, “Pengamanan Citra dengan Algoritma Diffie-Hellman dan Algoritma Simplified Data Encryption Standard (S-DES),” J. Ilm. Mat. dan Pendidik. Mat., vol. 10, no. 2, pp. 63–80, 2018.

A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” Int. J. Sci. Res., vol. 5, no. 7, pp. 1149–1152, 2016.

A. I. Permana, T. Tulus, and Z. Situmorang, “Combination of One Time Pad Cryptography Algorithm with Generate Random Keys and Vigenere Cipher with EM2B KEY,” 2020, doi: 10.4108/eai.3-8-2019.2290723.

V. S. Ginting, “Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa,” J. Teknol. Inf., vol. 4, no. 2, pp. 241–246, 2020, doi: 10.36294/jurti.v4i2.1365.

A. Serdano, M. Zarlis, Sawaluddin, and D. Hartama, “Pengamanan Pesan Menggunakan Algoritma Hill Cipher Dalam Keamanan Komputer,” J. Mahajana Inf., vol. 4, no. 2, pp. 1–5, 2019.

Y. W. Hasibuan, R. B. Veronica, J. Matematika, U. N. Semarang, K. S. Gunungpati, and I. Artikel, “How to Cite,” vol. 11, no. 1, pp. 54–68, 2022.

A. Manaor, H. Pardede, H. Manurung, and D. Filina, “Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi,” J. Tek. Inform. Kaputama, vol. 1, no. 1, pp. 26–33, 2017.

A. Wahyuni, “Keamanan Pertukaran Kunci Kriptografi dengan Algoritma Hybrid : Diffie-Hellman dan RSA,” Maj. Ilm. Inform., vol. 2, no. 2, pp. 15–23, 2011.

Purwadi, H. Jaya, and A. Calam, “Aplikasi Kriptografi Asimetris dengan Metode Diffie-Hellman dan Algoritma ElGamal untuk Keamanan Teks,” J. Ilm. Saintikom, vol. 13, no. 3, pp. 183–196, 2014.

W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory., vol. 22, no. 6, pp. 644–654, 1976.

Abdul Halim Hasugian, “Implementasi Algoritma Hill Cipher Dalam Penyandian Data,” Pelita Inform. Budi Darma, vol. IV, no. 2, pp. 115–122, 2013.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Pembangkitan Kunci pada Algoritma Hill Cipher menggunakan Teknik Distribusi Angka Diffie-Hellman

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Andysah Putera Utama Siahaan

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
P3M STMIK Budi Darma
Sekretariat Jln. Sisingamangaraja No. 338 Telp 061-7875998
email: komik@univ-bd.ac.id, komik.budidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.