Perpaduan Algoritma Kriptografi Atbash dan Autokey Cipher dalam Mengamankan Data
DOI:
https://doi.org/10.30865/mib.v5i3.3019Keywords:
Atbash, Autokey, Data, Cryptography, SecurityAbstract
Data security is an important thing that must be done in the cyber era. The use of various kinds of digital technology in helping various human activities needs to be balanced with adequate data security. One of the ways that can be used in securing data is through cryptography. Atbash cipher is one of the cryptographic techniques used in securing data. However, this algorithm has a weakness because it only uses the process of reversing the position of the characters to be secured. This study proposes a cryptographic model that can maximize data security from the atbash cipher. The proposed model is a combination of the atbash cipher with the autokey cipher. The tests carried out on the proposed model have a 100% success rate, meaning that the encrypted message resulting from the proposed encryption process has been successfully restored to its original form through the proposed decryption process. The results of this study indicate that the atbash cipher cryptographic algorithm, combined with the autokey cipher algorithm can produce an encrypted message that is more difficult to crack.References
S. Aldossary and W. Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions,†Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 4, pp. 485–498, 2016, doi: 10.14569/ijacsa.2016.070464.
A. Tchernykh, U. Schwiegelsohn, E. ghazali Talbi, and M. Babenko, “Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability,†J. Comput. Sci., vol. 36, 2019, doi: 10.1016/j.jocs.2016.11.011.
H. N. Noor Muchsin, D. E. Sari, D. R. Ignatius Moses Setiadi, and E. H. Rachmawanto, “Text Encryption using Extended Bit Circular Shift Cipher,†in Proceedings of 2019 4th International Conference on Informatics and Computing, ICIC 2019, 2019, pp. 0–4, doi: 10.1109/ICIC47613.2019.8985708.
J. R. Paragas, A. M. Sison, and R. P. Medina, “An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box,†in 2019 IEEE Eurasia Conference on IOT, Communication and Engineering, ECICE 2019, 2019, pp. 77–81, doi: 10.1109/ECICE47484.2019.8942717.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,†Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, 2017, doi: 10.14569/ijacsa.2017.080659.
N. Atikah, M. R. Ashila, D. R. I. M. S. Setiadi, E. H. Rachmawanto, and C. A. Sari, “AES-RC4 Encryption Technique to Improve File Security,†in Proceedings of 2019 4th International Conference on Informatics and Computing, ICIC 2019, 2019.
O. G. Abood and S. K. Guirguis, “A Survey on Cryptography Algorithms,†Int. J. Sci. Res. Publ., vol. 8, no. 7, 2018, doi: 10.29322/ijsrp.8.7.2018.p7978.
M. D. Sinaga, N. S. B. Sembiring, F. Tambunan, and C. J. M. Sianturi, “Hybrid Cryptography WAKE (Word Auto Key Encryption) and Binary Caesar Cipher Method for Data Security,†2018 6th Int. Conf. Cyber IT Serv. Manag. CITSM 2018, no. Citsm, pp. 1–5, 2019, doi: 10.1109/CITSM.2018.8674346.
M. I. Afandi and N. Nurhayati, “Implementasi Algoritma Vigenere Cipher Dan Atbash Cipher Untuk Keamanan Teks Pada Aplikasi Catatan Berbasis Android,†IT J., vol. 8, no. 1, pp. 30–41, 2020.
N. Sureshkumar, A. K. Nanda, P. Kollapudi, and B. Harish, “Provision of Security Using Substitution Ciphers,†J. Crit. Rev., vol. 7, no. 04, pp. 918–923, 2020.
I. S. Sabana and L. Tanti, “Pengembangan Model Keamanan Data Inventory Dengan,†J. FTIK, vol. 1, no. 1, pp. 607–618, 2020.
S. A. Meliala, “Perancangan Aplikasi Pengkodean dan Penyembunyian Pesan dalam Media Citra dengan Menggunakan Algoritma Atbash Chiper dan Metode Bit Plane Complexity Segmentation,†J. Pelita Inform., vol. 18, no. 1, pp. 113–120, 2019.
D. P. Timothy and A. K. Santra, “A hybrid cryptography algorithm for cloud computing security,†2017 Int. Conf. Microelectron. Devices, Circuits Syst. ICMDCS 2017, vol. 2017-Janua, pp. 1–5, 2017, doi: 10.1109/ICMDCS.2017.8211728.
I. Gunawan, “Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks,†InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 124–129, 2018, doi: 10.30743/infotekjar.v2i2.266.
O. GroÅ¡ek, E. Antal, and T. FabÅ¡iÄ, “Remarks on breaking the Vigenère autokey cipher,†Cryptologia, vol. 43, no. 6, pp. 486–496, 2019, doi: 10.1080/01611194.2019.1596997.
B. Triandi, E. Ekadiansyah, R. Puspasari, L. T. Iwan, and F. Rahmad, “Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions,†2018 6th Int. Conf. Cyber IT Serv. Manag. CITSM 2018, no. Citsm, pp. 1–5, 2019, doi: 10.1109/CITSM.2018.8674376.
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,†Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).