Application of Combination of Caesar Cipher Algorithm on Random Block and Transposition Cipher in Securing Messages
DOI:
https://doi.org/10.46229/jifotech.v1i1.235Keywords:
Cryptography, Caesar Cipher, Random selection, Transposition CipherAbstract
The developments in technology for using security of information are still a threat to every party in processing and transaction confidentiality of messages sent received by users. In this study, the authors carried out a process of learning in terms of classical security with a Caesarean algorithm model with technical support for random blocks of messages and the use of ciphertexts in password transposition. This is to see how the flow can be controlled in describing a message to be conveyed to the required destination. This process is invincible with a few simple experiments, in order to achieve the desired results. Some of the research results carried out in this study include (1) the existence of a process in using the Caesarean cipher cryptographic algorithm, (2) For learning in an information or message that will be sent every time it is received, (3) Each stage of the Caesarean Cipher algorithm is very useful for exploring a messages with a more secure yahoo combination. (4) Can carry out a combination process with random block techniques and transposition ciphers.
References
REFERENSI
I. Gunawan, “Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 124–129, 2018, doi: 10.30743/infotekjar.v2i2.266.
A. Basuki, U. Paranita, and R. Hidayat, “Perancangan Aplikasi Kriptografi Berlapis menggunakan Algoritma Caesar, Transposisi, Vigenere, dan Blok Chiper Berbasis Mobile,” Semin. Nas. Teknol. Inf. Dan Multimed. 2016, vol. 1, no. 2, pp. 31–35, 2016.
M. Mohan, M. K. Kavitha Devi, and V. Jeevan Prakash, “Security analysis and modification of classical encryption scheme,” Indian J. Sci. Technol., vol. 8, no. 14, pp. 542–548, 2015, doi: 10.17485/ijst/2015/v8i14/59192.
K. Goyal and S. Kinger, “Modified Caesar Cipher for Better Security Enhancement,” Int. J. Comput. Appl., vol. 73, no. 3, pp. 26–31, 2013, doi: 10.5120/12722-9558.
A. Caesar, “Perancangan Aplikasi Kriptografi Berlapis Menggunakan,” Semin. Nas. Teknol. Inf. Dan Multimed. 2016, vol. 6, no. 6, pp. 6–7, 2016.
T. Limbong and P. D. P. Silitonga, “Testing the Classic Caesar Cipher Cryptography using of Matlab,” Int. J. Eng. Res. Technol., vol. 6, no. 2, pp. 175–178, 2017, doi: 10.17605/OSF.IO/PEMA5.
H. Angriani and Y. Saharaeni, “Implementasi Algoritma Caesar Cipher pada Keamanan Data Sistem e-voting Pemilihan Ketua Organisasi Kemahasiswaan,” Inspir. J. Teknol. Inf. dan Komun., vol. 9, no. 2, p. 123, 2019, doi: 10.35585/inspir.v9i2.2499.
Y. Rajput, D. Naik, and C. Mane, “An Improved Cryptographic Technique to Encrypt Text using Double Encryption,” Int. J. Comput. Appl., vol. 86, no. 6, pp. 24–28, 2014, doi: 10.5120/14990-2582.