Analysis of Classical Cryptographic Algorithms Caesar Cipher Vigenere Cipher and Hill Cipher – Study Literature

  • Noviyanti. P Institut Shanti Bhuana
  • Mira Universitas Kristen Satya Wacana
Keywords: Classical Cryptography, Caesar Cipher, Vigenere Cipher, Hill Cipher, study literature

Abstract

The process of encryption and description of a message is a third party called cryptography. Cryptography is a technique for securely transferring information between two parties without intervention by external elements. The process of securing information can be done with several available cryptographic algorithms. Cryptographic algorithms consist of two eras, namely, classical algorithms and modern algorithms. Classical algorithms were generally used in the past using only substitution and permutation methods. While modern algorithms are algorithms that can be recognized, read and understood by computers that produce the numbers 0 and 1 or commonly called binary data. The purpose of the analysis is to determine the development of security and complexity of standard classical algorithms and classical algorithms with modifications.

References

A. Saraswat, C. Khatri, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” 2nd Int. Conf. Intell. Comput. Commun. Converg., vol. 92, pp. 355–360, 2016, doi: 10.1016/j.procs.2016.07.390.

F. I. Lubis, H. F. S. Simbolon, T. P. Batubara, and R. W. Sembiring, “Combination of caesar cipher modification with transposition cipher,” Adv. Sci. Technol. Eng. Syst., vol. 2, no. 5, pp. 22–25, 2017, doi: 10.25046/aj020504.

L. Kartika and Y. Yudi, “Rancang Bangun Aplikasi Penyembunyian Pesan QRCode Dengan Menggunakan Metode Caesar Cipher Berbasis Android,” J. Mhs. Fak. Tek. …, pp. 511–518, 2020, [Online]. Available: http://e-journal.potensi-utama.ac.id/ojs/index.php/FTIK/article/view/902.

D. Susianto and D. Mustika, “Membangun Sistem Informasi Inventory menggunakan Algoritma Caesar Cipher sebagai Media Enkripsi (Studi Kasus: Klinik Ridho Husada),” J. Cendikia, vol. XVIII, no. Oktober, pp. 309–315, 2019.

T. S. Alasi, A. T. Al, and A. Siahaan, “Algoritma Vigenere Cipher Untuk Penyandian Record Informasi Pada Database,” J. Inf. Komput. Log., vol. 1, no. 4, 2020, [Online]. Available: http://ojs.logika.ac.id/index.php/jikl.

I. Technology and C. Science, “WEB-BASED ONLINE ATTENDANCE SYSTEM WITH QR CODE IN REAL,” vol. 4, 2021.

D. M. Sholahudin and Asmunin, “Implementasi Algoritma Hill Cipher untuk Proses Enkripsi dan Dekripsi Citra Berwarna dengan Modifikasi Padding,” J. Informatics Comput. Sci., vol. 01, no. 04, pp. 228–234, 2020.

J. Freddy et al., “Kriptografi Teks dan Citra dengan Menggunakan Algoritma Hill Cipher pada Perangkat Android,” J. Masy. Inform., vol. 8, no. 1, pp. 9–15, 2017.

P. Studi and T. Informatika, “Modifikasi Ceasar Cipher menjadi Cipher Abjad-Majemuk dan Menambahkan Kunci berupa Barisan Bilangan.”

M. I. D. Ramdhani, “Perbandingan Kriptografi Klasik ( Caesar Cipher ) dan Kriptografi Modern ( MD5 ),” no. May, 2016, [Online]. Available: https://www.researchgate.net/publication/303382769_Perbandingan_Kriptografi_Klasik_Caesar_Cipher_dan_Kriptografi_Modern_MD5.

S. Agustini, W. M. Rahmawati, and M. Kurniawan, “Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher,” Int. J. Artif. Intell. Robot., vol. 1, no. 1, pp. 26–31, 2019, doi: 10.25139/ijair.v1i1.2029.

S. Aggarwal, “A REVIEW ON ENHANCING CAESAR CIPHER,” Int. J. Res. Sci. Manag. A, vol. 29, no. 8, pp. 1757–1760, 2017.

R. Politeknik Ganesha Medan, “Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security,” Int. J. Inf. Syst. Technol. Akreditasi, vol. 4, no. 1, pp. 471–481, 2020.

H. Mohammad Andri Budiman, Muhammad Yogi Saputra, “A Hybrid Cryptosystem Using Vigenère Cipher and Rabin-p Algorithm in Securing BMP Files,” J. Comput. Appl. Informatics, vol. 4, no. September 2016, pp. 2016–2017, 2018, [Online]. Available: https://www.data-science.ruhr/about_us/.

A. P. U. Siahaan, “Genetic Algorithm in Hill Cipher Encryption,” Am. Int. J. Res. Sci. Technol. Eng. Math., vol. 15, no. 1, pp. 84–89, 2016.

A. Putera, U. Siahaan, and A. H. Cipher, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” Int. J. Sci. Res., vol. 5, no. 7, pp. 1149–1152, 2016, doi: 10.21275/v5i7.art2016437.

R. A. Megantara, F. A. Rafrastara, and S. N. Mahendra, “A Combination of Hill CIPHER-LSB in RGB Image Encryption,” Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron. Control, vol. 4, no. 3, pp. 241–248, 2019, doi: 10.22219/kinetik.v4i3.785.

A. Rachmadsyah, A. Perdana, and A. B. S. T, “Kombinasi Algoritma Beaufort Cipher Dan Vigenere Cipher Untuk Pengamanan Pesan Teks Berbasis Mobile Application,” vol. 9, no. September, pp. 12–17, 2020.

A. C. Frobenius and E. R. Hidayat S. H. S, “Steganografi LSB Dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher dan Playfair Pada Image,” Melek IT Inf. Technol. J., vol. 6, no. 1, pp. 33–40, 2020, doi: 10.30742/melek-it.v6i1.301.

V. S. Ginting, “Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa,” JurTI (Jurnal Teknol. Informasi), vol. 4, no. 2, pp. 241–246, 2020, [Online]. Available: http://www.jurnal.una.ac.id/index.php/jurti/article/view/1365.

R. A. Megantara and F. A. Rafrastara, “Super Enkripsi Teks Kriptografi menggunakan Algoritma Hill Cipher dan Transposisi Kolom,” Pros. SENDI_U 2019, pp. 85–92, 2019.

Sumandri, “Studi Model Algoritma Kriptografi Klasik dan Modern,” Semin. Mat. dan Pendidik. Mat. UNY, pp. 265–272, 2017.

A. Antoni, S. Aryza, A. R. Lubis, B. Harahap, and M. Arfah, “A novelty methods of cryptography algorithms into layered cipher encryption and decryption,” Int. J. Eng. Technol., vol. 7, no. 14, pp. 289–292, 2018, doi: 10.14419/ijet.v7i2.8953.

A. yudo Husodo, “Penerapan Metode Enkripsi Vigenere Cipher dalam Pengamanan Transaksi Mobile Banking,” Makal. If3058 Kriptografi, pp. 1–10, 2010.

A. Hidayat and T. Alawiyah, “Enkripsi dan Dekripsi Teks menggunakan Algoritma Hill Cipher dengan Kunci Matriks Persegi Panjang,” J. Mat. Integr., vol. 9, no. 1, p. 39, 2013, doi: 10.24198/jmi.v9i1.10196.

Published
2022-03-21
How to Cite
Noviyanti. P, & Mira. (2022). Analysis of Classical Cryptographic Algorithms Caesar Cipher Vigenere Cipher and Hill Cipher – Study Literature. Journal of Information Technology, 2(1), 23-30. https://doi.org/10.46229/jifotech.v2i1.387