Modification of Caesar Chiper Cryptographic Algorithm in Symbol and Letter Advantage on Smarphone and Laptop

  • Prima Giri Pamungkas UNIVERSITAS AMIKOM YOGYAKARTA
  • Alva Hendi Muhammad Universitas AMIKOM Yogyakarta
Keywords: Cryptography, Caesar Cipher, Cipher Text, Encryption, Decryption

Abstract

Developments in the world of information technology utilizing computer technology make it an option in doing various things contained in it can be in the form of applications, sms or data security systems that maintain the security and confidentiality of information data in development sciences such as cryptography. In the application that is done not from just one security technique but can be done with various combinations or modifications in data and information security. The main concepts in cryptography are encryption and decryption. A message, information or data that is encrypted so that people who are not entitled to read the message will not be able to read it. From the development of various methods of using cryptography, it can often be broken and resolved by unauthorized parties because the key to the information in the data message is not difficult to crack. In this paper, the author modifies the Caesar Cipher method using several symbols and numbers to produce a pattern with several stages of the method.

References

B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext from a Message to Be Encrypted,” Procedia Comput. Sci., vol. 59, no. Iccsci, pp. 195–204, 2015, doi: 10.1016/j.procs.2015.07.552.

D. Ariyus, Pengantar Ilmu Kriptografi : Teori Analisis dan Implementasi. Yogyakarta: ANDI, 2008.

S. Kromodimoeljo, Teori dan Aplikasi Kriptografi. SPK IT Consulting, 2009.

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

B. A. Forouzan, Cryptography and Network Security. New York: Mc Graw Hill, 2008.

S. B. Dar, “Enhancing the Security of Caesar Cipher Using Double Substitution Method,” Int. J. Comput. Sci. Eng. Technol., vol. 5, no. 7, pp. 772–774, 2014.

A. Hamzah, “Deteksi Bahasa Untuk Dokumen Teks,” Semin. Nas. Inform., vol. 22, no. semnasIF, pp. 5–13, 2010.

T. Technique, “Using Letters Frequency Analysis in Caesar Cipher with Double Columnar,” vol. 2, no. 6, 2013.

P. F. Ariyani and R. O. D. Saputra, “Pemanfaatan Algoritma Caesar Cipher dan RC6 untuk Pengamanan SMS pada Smartphone Berbasis Android,” Telemat. MKOM, vol. 7, no. 2, 2015.

A. Pradipta, “Implementasi Metode Caesar Chiper Alphabet Majemuk Dalam Kriptografi Untuk Pengamanan Informasi,” Indones. J. Netw. Secur., vol. 5, no. 3, pp. 3–6, 2016.

R. K. Hondro, “Aplikasi Enkripsi Dan Dekripsi Sms Dengan Algoritma Zig Zag Cipher Pada Mobile Phone Berbasis Android,” no. July 2015, 2018, doi: 10.31227/osf.io/a2dwn.

A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sinkron, vol. 2, no. 2, pp. 13–17, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/index.

Published
2022-03-21
How to Cite
Pamungkas, P. G., & Muhammad, A. H. (2022). Modification of Caesar Chiper Cryptographic Algorithm in Symbol and Letter Advantage on Smarphone and Laptop. Journal of Information Technology, 2(1), 1-5. https://doi.org/10.46229/jifotech.v2i1.234