Data Security with Super Encryption Combination of Vigenere and Atbash Cipher

Authors

  • Argia Putri Ramadhani Universitas Tunas Pembangunan Surakarta
  • Nanda Putri Tami Universitas Tunas Pembangunan Surakarta
  • Asih Lestari Universitas Tunas Pembangunan Surakarta
  • Vera Wati Universitas Tunas Pembangunan Surakarta
  • Wartono Wartono Universitas Tunas Pembangunan Surakarta

DOI:

https://doi.org/10.46229/jifotech.v4i2.920

Keywords:

Data Security, Super Encryption, Vigenere Cipher, Atbash Cipher, Cryptography

Abstract

The demands of the digital world are becoming increasingly complex, necessitating effective measures to secure data. The primary challenge in data security lies in threats from unauthorized parties attempting to access sensitive information. Ensuring data integrity during exchange also requires attention to security. Another challenge arises from the expanding connectivity of data use, which calls for reliable and effective solutions. One approach is the application of cryptography with a super-encryption technique, which combines multiple cryptographic algorithms to create ciphertext that is difficult to break. The proposed combination uses Vigenere and Atbash ciphers in a single method. This aims to leverage the strengths of each algorithm in securing messages with relatively long character strings. This study demonstrates that super encryption using a Vigenere and Atbash cipher combination successfully performs encryption and decryption, with execution times under one second for each algorithm. This combination has the longest execution time, averaging 0.0047 seconds for encryption and 0.0045 seconds for decryption. Evaluations show that the Vigenere cipher creates a random distribution of letters, and although Atbash does not significantly alter this randomness, it provides letter variation that enhances security. The combination of these two algorithms effectively strengthens data protection.

References

V. Wati, H. Sadiyah, and D. Ariyus, “PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL,” J. ILMU Pengetah. DAN Teknol. Komput., vol. 5, no. 2, pp. 197–204, 2020.

E. Irianti, D. F. Surianto, Ainun Zahra Adistia, Muh. Juharman, and Jumadil Ahmad Safi’i, “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 1, pp. 8–15, 2023, doi: 10.61255/pisces.v1i1.24.

M. I. Afandi and N. Nurhayati, “Implementasi Algoritma Vigenere Cipher Dan Atbash Cipher Untuk Keamanan Teks Pada Aplikasi Catatan Berbasis Android,” IT J, vol. 8, no. 1, pp. 30–41, 2020.

A. Aprianto, E. I. Alwi, and H. Herman, “Implementasi Algoritma Caesar Cipher Dengan Kombinasi Transposisi Diagonal Untuk Enkripsi Dekripsi Menggunakan Tabel ASCII,” Bul. Sist. Inf. dan Teknol. Islam, vol. 3, no. 3, pp. 238–247, 2022.

L. Valdho Falensky and M. A. Ineke Pakereng, “Pengamanan Data Pasien Di UPT. Puskesmas Pujon Kalimantan Tengah Menggunakan Kriptografi Super Enkripsi,” J. Sains Komput. Inform., vol. 6, no. 2, pp. 711–725, 2022.

N. B. Putra, B. C. Andika, A. D. P. Bagas, and M. Ridwan, “Implementasi Sandi Vigenere Cipher Dalam,” J. JOCOTIS-Journal Sci. Inform. Robot., vol. 1, no. 1, pp. 42–50, 2023.

Saputra, “Pemanfaatan Algoritma Vigenere Cipher untuk Meningkatkan Keamanan Data Resep Obat di Puskesmas Mertoyudan 1 Kabupaten Magelang,” Maret, vol. 2, no. 2, p. 2023, 2023.

D. Astuti and C. Sundari, “Implementasi Algoritma Vigenere Cipher Untuk Enkripsi Dan Dekripsi Pada Peresepan Data Obat Di Puskesmas Mertoyudan 1 Kabupaten Magelang,” J. Tek. Inf. dan Komput., vol. 5, no. 2, p. 341, 2022, doi: 10.37600/tekinkom.v5i2.534.

E. N. Wahyudi et al., “Peningkatan Keamanan Data Melalui Teknik Super Enkripsi Menggunakan Algoritma Vigenere dan Caesar,” J. Inform. Polinema, vol. 10, no. 3, pp. 315–322, 2024, doi: 10.33795/jip.v10i3.5131.

A. Syahputra, S. Sundari, and F. Damayanti, “Implementasi algoritma Kriptografi Simetris Atbash Cipher dan Teknik Transposisi Segitiga Untuk Pengamanan File Teks,” in Seminar Nasional Teknologi Informasi & Komunikasi (SNASTIKOM), 2021, pp. 8–15. [Online]. Available: http://download.garuda.kemdikbud.go.id/article.php?article=2573820%5C&val=24090%5C&title=Implementasi algoritma Kriptografi Simetris Atbash Cipher dan Teknik Transposisi Segitiga Untuk Pengamanan File Teks

P. A. Verma and A. Gakhar, “Analysis of Tools and Techniques in cryptography,” FP-International J. Comput. Sci. Res., vol. 2, no. 1, pp. 37–44, 2015.

M. Fadlan, R. Rosmini, and H. Haryansyah, “Perpaduan Algoritma Kriptografi Atbash dan Autokey Cipher dalam Mengamankan Data,” J. Media Inform. Budidarma, vol. 5, no. 3, p. 806, 2021, doi: 10.30865/mib.v5i3.3019.

B. A. Forouzan, Cryptography & Network Security. McGraw-Hill, Inc., 2007.

V. M. Hidayah, D. I. Mulyana, and Y. Bachtiar, “Algoritma Caesar cipher atau Vigenere cipher pada pengenkripsian pesan teks,” J. Educ., vol. 5, no. 3, pp. 8563–8573, 2023.

C. Danuputri, N. Santosa, and F. D. Samuel, “Pengujian Pengembangan Terhadap Algoritma Vigenere Key Kriptografi,” J. Resist. (Rekayasa Sist. Komputer), vol. 5, no. 1, pp. 26–37, 2022

Published

2024-11-15

How to Cite

Ramadhani, A. P., Tami, N. P., Lestari, A., Wati, V., & Wartono, W. (2024). Data Security with Super Encryption Combination of Vigenere and Atbash Cipher. Journal of Information Technology, 4(2), 231–240. https://doi.org/10.46229/jifotech.v4i2.920