PENERAPAN KOMBINASI METODE VIGENERE CIPHER, CAESAR CIPHER DAN SIMBOL BACA DALAM MENGAMANKAN PESAN
DOI:
https://doi.org/10.33020/saintekom.v11i1.202Keywords:
Crypthography, Vigenere Cipher, Caesar CipherAbstract
The concept that an important information cannot be known by parties who don’t have rights can be done by making the confidentiality of data using cryptography. Safety in vigenere ciphers depends on the number of keys used, the more the number of keys, the wider the key space. While caesar cipher or often also called caesar code is a classic coding system based on simple substitution. This study uses a combination of Vigenere Cipher and Caesar Cipher algorithms so that the security of the contents of the message is protected stronger and safer so that if the message sent is tapped by someone who is not responsible then the hijacker has difficulty knowing contents of the message. So that the confidentiality and authenticity of message is up to the recipient In this study successfully implemented both methods and has an output in the form of a reading symbol, not letters.
Downloads
References
Kurniawan, Y. M., 2014. Kriptografi: Keamanan Internet dan Jaringan Komunikasi. Bandung: Informatika.
Nasution, S. D., Ginting, G. L., Syahrizal, M. & Rahim, R., 2017. Data Security Using Vigenere Cipher and Goldbach Codes Algorithm. International Journal of Engineering Research & Technology (IJERT), 6(1), pp. 360-363.
Sadikin, R., 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Yogyakarta: Andi.
Silangen, M., 2017. Enkripsi dan Penyembunyian Data Dalam File Audio Menggunakan Triple Des dan Parity Coding, Yogyakarta: Universitas Gajah Mada.
Silangen, M. & Pardede, A. M. H., 2018. Pengamanan File Teks Menggunakan Kombinasi Algoritma Viginere Cipher dan Triple Columner. Jurnal Ilmiah Behongang, 1(2), pp. 38-42.
Susanto, I. A. & Solichin, A., 2018. Enkripsi Data Penggajian Dengan Algoritma Caesar Cipher dan Vigenere Cipher Pada PT. Kemasindo Cepat Nusantara. SKANIKA, 1(1), pp. 399-404.
Downloads
Published
How to Cite
Issue
Section
License
Copyright :
By submitting manuscripts to Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen, the author agrees with this policy. No specific document approval is required.
- The copyright in each article belongs to the author.
- Authors retain all their rights to the published work, not limited to the rights set forth in this page.
- Authors acknowledge that Saintekom Journal: Science, Technology, Computers and Management as the first to publish under the Creative Commons Attribution 4.0 International license (CC BY-SA).
- The author may submit the paper separately, arrange for non-exclusive distribution of the manuscript that has been published in this journal into other versions (e.g. sent to the author's institutional respository, publication into a book, etc.), by acknowledging that the manuscript has been first published Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen;
- The author warrants that the article is original, written by the named author, has not been previously published, contains no unlawful statements, does not infringe the rights of others, is subject to copyright exclusively held by the author.
- If the article is jointly prepared by more than one author, each author submitting the manuscript warrants that he or she has been authorized by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agrees to inform co-authors of the terms of this policy. Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen will not be held liable for anything that may arise due to internal author disputes.
Lisensi :
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY-SA). This license permits anyone to:.
- Share - copy and redistribute this material in any form or format;
- Adaptation - modify, alter, and create derivatives of this material for any purpose.
- Attribution - you must give appropriate credit, include a link to the license, and state that changes have been made. You may do this in any appropriate manner, but it does not imply that the licensor endorses you or your use.
- Similar Sharing - If you modify, alter, or create a derivative of this material, you must distribute your contribution under the same license as the original material.
Most read articles by the same author(s)
- Rifqi Hammad, Veny Cahya Hardita, Muhammad Zulfikri, Eka Wahyu Sholeha, PENERAPAN METODE APRIORI SEBAGAI SISTEM PENDUKUNG KEPUTUSAN PEMBENTUKAN PAKET PENJUALAN BIBIT BUAH , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 12 No. 1 (2022): March 2022
- Lili Rusdiana, Veny Cahya Hardita, Algoritma K-Means dalam Pengelompokan Surat Keluar pada Program Studi Teknik Informatika STMIK Palangkaraya , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 13 No. 1 (2023): March 2023