Combination of vigenere cipher cryptographic algorithm with zigzag method in securing text messages

  • Faris Apriliano Eka Fardianto Faris UIN Suska Riau
  • Febi Yanto Febi Universitas Islam Negeri Sultan Syarif Kasim Riau
  • Iwan Iskandar Iwan Universitas Islam Negeri Sultan Syarif Kasim Riau
  • Pizaini Pizaini Universitas Islam Negeri Sultan Syarif Kasim Riau
Keywords: cryptography, encryption, decryption, vigenere, zig-zag

Abstract

The rapid development of technology makes it easier to get information quickly and easily. Some information is public and some are confidential. Confidential information certainly requires security in maintaining confidentiality by parties not interested in the information. There are many forms of personal information, one of which is information in the form of text. Providing security to text messages can be done with cryptographic techniques. Cryptographic techniques work by encrypting the original message (plaintext) into text that is difficult to understand (ciphertext), which usually contains no meaning. This research uses classical cryptography where the encryption technique uses the decryption key used the same as the encryption key at the time of encoding. This research uses vigenere cipher and zigzag cipher cryptographic algorithms. Vigenere cipher algorithm is a cryptographic technique that uses a word or sentence with the length of the key adjusting to the plaintext. In comparison, zigzag ciphers use transposition techniques from columns and rows. The use of two cryptographic algorithms at once is intended to provide super security, encryption with layered keys and cryptanalysts will be difficult in cracking the information that has been encoded. Testing is carried out by performing mathematical calculations from vigenere and zigzag algorithms first which are used as a basis for implementation into text encoding simulation systems. On the system that has been created gives the same result as mathematical calculations. In ciphertext cracking tests using the Boxentrix system cannot return plaintext in the absence of a predefined key. While in performance testing the time depends on the number of characters used, the more the number of characters, the encryption and decryption time also increases.

Downloads

Download data is not yet available.

References

N. Uniyal, G. Dobhal, A. Rawat, and A. Sikander, “A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication,” Wirel. Pers. Commun., vol. 119, no. 2, pp. 1577–1587, 2021, doi: 10.1007/s11277-021-08295-5.

M. Ziaurrahman, E. Utami, and F. W. Wibowo, “Modifikasi Kriptografi Klasik Vigenere Cipher Menggunakan One Time Pad Dengan Enkripsi Berlanjut,” J. Inform. dan Teknol. Inf., vol. 4, no. 1, p. (halaman 2), 2019.

M. O. I. Ruing and E. I. H. Ujianto, “Penerapan Kombinasi Algoritma Kriptografi ( Caesar, Vigenere, Zig-Zag ) Dan Metode Steganografi Lsb Untuk Mengamankan Pesan Ke Dalam Citra Digital,” pp. 1–8, 2020, [Online]. Available: http://eprints.uty.ac.id/4888/.

M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018, doi: 10.24843/mite.2018.v17i01.p08.

M. Zalukhu, K. J. Hondro, and Y. S. Hondro, “Aplikasi Pengamanan File Video Menggunakan Teknik Kriptografi Algoritma Transposisi Zig-Zag,” J. Mahajana Inf., vol. 3, no. 2, pp. 33–40, 2018.

M. R. Firdaus and S. Waluyo, “Sistem Keamanan Chat Berbasis Web Menggunakan Algoritma Zig Zag Studi Kasus : Noktournal Motoshop,” Skanika, vol. 1, no. 1, pp. 166–172, 2018.

Jamaludin, “Rancang Bangun Kombinasi Chaisar Cipher dan Vigenere Cipher Dalam Pengembangan Algoritma Kriptografi Klasik,” Semant. (Seminar Nas. Tek. Inform., vol. 1, no. 1, pp. 234–243, 2017, [Online]. Available: https://semantika.polgan.ac.id/index.php/Semantika/article/view/36.

Imam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: 10.14421/jiska.2022.7.1.33-45.

A. D. Achmad, A. A. Dewi, M. R. Purwanto, P. T. Nguyen, and I. Sujono, “Implementation of vigenere cipher as cryptographic algorithm in securing text data transmission,” J. Crit. Rev., vol. 7, no. 1, pp. 76–79, 2020, doi: 10.22159/jcr.07.01.15.

D. Astuti and C. Sundari, “Implementasi Algoritma Vigenere Cipher Untuk Enkripsi Dan Dekripsi Pada Peresepan Data Obat Di Puskesmas Mertoyudan 1 Kabupaten Magelang,” J. Tek. Inf. dan Komput., vol. 5, no. 2, p. 341, 2022, doi: 10.37600/tekinkom.v5i2.534.

V. K. Mittal and M. Mukhija, “Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique,” Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, pp. 1936–1939, 2019, doi: https://doi.org/10.31142/ijtsrd27878.

A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sinkron, vol. 2, no. 2, pp. 13–17, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/index.

R. S. Lubis, Tulus, and E. B. Nababan, “Pengamanan File Teks Menggunakan Algoritma RSA – LUC dan Algoritma Zig- Zag dalam Hybrid Crypto Sistem,” InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. 6, no. 2, pp. 185–189, 2022.

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” J. Phys. Conf. Ser., vol. 978, no. 1, pp. 1–6, 2018, doi: 10.1088/1742-6596/978/1/012086.

T. Zebua, “Analisa Perbandingan Least Significant Bit dan End of File Untuk Steganografi Citra Digital Menggunakan Matlab,” no. July, 2018.

O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK J. Inov. Vokasional dan Teknol., vol. 20, no. 1, pp. 27–36, 2020, doi: 10.24036/invotek.v20i1.647.

A. Amrulloh and E. I. H. Ujianto, “Kriptografi Simetris Menggunakan Algoritma Vigenere Cipher,” J. CoreIT, vol. 5, no. 2, pp. 71–77, 2019.

A. Suheri, “Keamanan File Dengan Teknik Zig-zag dan Huffman,” Media J. Inform., vol. 9, no. 2, pp. 78–83, 2017, [Online]. Available: https://jurnal.unsur.ac.id/mjinformatika/article/view/450.

M. D. Irawan, “Implementasi Kriptografi Vigenere Cipher Dengan Php,” J. Teknol. Inf., vol. 1, no. 1, pp. 11–21, 2017, doi: 10.36294/jurti.v1i1.21.

A. E. Adeniyi, S. Misra, E. Daniel, and A. Bokolo, “Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data,” Algorithms, vol. 15, no. 373, pp. 1–14, 2022.

Z. Huwaidi and K. Prayoga, “Penerapan Enkripsi Dan Dekripsi Pesan Menggunakan Algoritma Qwerty, Caesar Chiper, Dan Zig-Zag Chiper,” Fak. Ilmu Komputer, Univ. AMIKOM, Jur. Tek. Komput., pp. 1–4, 2018.

Sudyana, D., Putra, R. T., & Soni, S. (2019). Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 3(2), 67-72. https://doi.org/10.33395/sinkron.v3i2.10029

Published
2023-04-30
How to Cite
Faris, F. A. E. F., Febi, F. Y., Iwan, I. I., & Pizaini, P. (2023). Combination of vigenere cipher cryptographic algorithm with zigzag method in securing text messages. Jurnal CoSciTech (Computer Science and Information Technology), 4(1), 182-192. https://doi.org/10.37859/coscitech.v4i1.4787
Abstract views: 292 , PDF downloads: 248