Data Security with Super Encryption Combination of Vigenere and Atbash Cipher
DOI:
https://doi.org/10.46229/jifotech.v4i2.920Keywords:
Data Security, Super Encryption, Vigenere Cipher, Atbash Cipher, CryptographyAbstract
The demands of the digital world are becoming increasingly complex, necessitating effective measures to secure data. The primary challenge in data security lies in threats from unauthorized parties attempting to access sensitive information. Ensuring data integrity during exchange also requires attention to security. Another challenge arises from the expanding connectivity of data use, which calls for reliable and effective solutions. One approach is the application of cryptography with a super-encryption technique, which combines multiple cryptographic algorithms to create ciphertext that is difficult to break. The proposed combination uses Vigenere and Atbash ciphers in a single method. This aims to leverage the strengths of each algorithm in securing messages with relatively long character strings. This study demonstrates that super encryption using a Vigenere and Atbash cipher combination successfully performs encryption and decryption, with execution times under one second for each algorithm. This combination has the longest execution time, averaging 0.0047 seconds for encryption and 0.0045 seconds for decryption. Evaluations show that the Vigenere cipher creates a random distribution of letters, and although Atbash does not significantly alter this randomness, it provides letter variation that enhances security. The combination of these two algorithms effectively strengthens data protection.
References
V. Wati, H. Sadiyah, and D. Ariyus, “PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL,” J. ILMU Pengetah. DAN Teknol. Komput., vol. 5, no. 2, pp. 197–204, 2020.
E. Irianti, D. F. Surianto, Ainun Zahra Adistia, Muh. Juharman, and Jumadil Ahmad Safi’i, “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 1, pp. 8–15, 2023, doi: 10.61255/pisces.v1i1.24.
M. I. Afandi and N. Nurhayati, “Implementasi Algoritma Vigenere Cipher Dan Atbash Cipher Untuk Keamanan Teks Pada Aplikasi Catatan Berbasis Android,” IT J, vol. 8, no. 1, pp. 30–41, 2020.
A. Aprianto, E. I. Alwi, and H. Herman, “Implementasi Algoritma Caesar Cipher Dengan Kombinasi Transposisi Diagonal Untuk Enkripsi Dekripsi Menggunakan Tabel ASCII,” Bul. Sist. Inf. dan Teknol. Islam, vol. 3, no. 3, pp. 238–247, 2022.
L. Valdho Falensky and M. A. Ineke Pakereng, “Pengamanan Data Pasien Di UPT. Puskesmas Pujon Kalimantan Tengah Menggunakan Kriptografi Super Enkripsi,” J. Sains Komput. Inform., vol. 6, no. 2, pp. 711–725, 2022.
N. B. Putra, B. C. Andika, A. D. P. Bagas, and M. Ridwan, “Implementasi Sandi Vigenere Cipher Dalam,” J. JOCOTIS-Journal Sci. Inform. Robot., vol. 1, no. 1, pp. 42–50, 2023.
Saputra, “Pemanfaatan Algoritma Vigenere Cipher untuk Meningkatkan Keamanan Data Resep Obat di Puskesmas Mertoyudan 1 Kabupaten Magelang,” Maret, vol. 2, no. 2, p. 2023, 2023.
D. Astuti and C. Sundari, “Implementasi Algoritma Vigenere Cipher Untuk Enkripsi Dan Dekripsi Pada Peresepan Data Obat Di Puskesmas Mertoyudan 1 Kabupaten Magelang,” J. Tek. Inf. dan Komput., vol. 5, no. 2, p. 341, 2022, doi: 10.37600/tekinkom.v5i2.534.
E. N. Wahyudi et al., “Peningkatan Keamanan Data Melalui Teknik Super Enkripsi Menggunakan Algoritma Vigenere dan Caesar,” J. Inform. Polinema, vol. 10, no. 3, pp. 315–322, 2024, doi: 10.33795/jip.v10i3.5131.
A. Syahputra, S. Sundari, and F. Damayanti, “Implementasi algoritma Kriptografi Simetris Atbash Cipher dan Teknik Transposisi Segitiga Untuk Pengamanan File Teks,” in Seminar Nasional Teknologi Informasi & Komunikasi (SNASTIKOM), 2021, pp. 8–15. [Online]. Available: http://download.garuda.kemdikbud.go.id/article.php?article=2573820%5C&val=24090%5C&title=Implementasi algoritma Kriptografi Simetris Atbash Cipher dan Teknik Transposisi Segitiga Untuk Pengamanan File Teks
P. A. Verma and A. Gakhar, “Analysis of Tools and Techniques in cryptography,” FP-International J. Comput. Sci. Res., vol. 2, no. 1, pp. 37–44, 2015.
M. Fadlan, R. Rosmini, and H. Haryansyah, “Perpaduan Algoritma Kriptografi Atbash dan Autokey Cipher dalam Mengamankan Data,” J. Media Inform. Budidarma, vol. 5, no. 3, p. 806, 2021, doi: 10.30865/mib.v5i3.3019.
B. A. Forouzan, Cryptography & Network Security. McGraw-Hill, Inc., 2007.
V. M. Hidayah, D. I. Mulyana, and Y. Bachtiar, “Algoritma Caesar cipher atau Vigenere cipher pada pengenkripsian pesan teks,” J. Educ., vol. 5, no. 3, pp. 8563–8573, 2023.
C. Danuputri, N. Santosa, and F. D. Samuel, “Pengujian Pengembangan Terhadap Algoritma Vigenere Key Kriptografi,” J. Resist. (Rekayasa Sist. Komputer), vol. 5, no. 1, pp. 26–37, 2022
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Argia Putri Ramadhani, Nanda Putri Tami, Asih Lestari, Vera Wati, Wartono Wartono
This work is licensed under a Creative Commons Attribution 4.0 International License.