PENGAMANAN DATA TEKS MELALUI PERPADUAN ALGORITMA BEAUFORT DAN CAESAR CIPHER

Authors

  • Muhammad Fadlan Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
  • Sinawati Sinawati Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
  • Aida Indriani Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
  • Evi Dianti Bintari Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati

DOI:

https://doi.org/10.15408/jti.v12i2.12262

Keywords:

Beaufort, Caesar, Kriptografi, Keamanan Data

Abstract

The importance of maintaining data integrity and security is one of the challenges in the current digital era. One method that can be used to face this challenge is through cryptography. In cryptography there are several algorithms that can be used, one of which is the Caesar cipher algorithm. This algorithm has several disadvantages, including a limited number of characters of 26 characters. This can make the encryption results easily recognizable by other parties. This study aims to design a proposal for maintaining data security through cryptographic techniques, while addressing the problems inherent in the Caesar cipher algorithm. The combination of Caesar and Beaufort algorithm is done to overcome the existing problems. In addition, a character list of 94 characters was determined to be used in the process of encryption and decryption of text data. The result, through the integration of these two algorithms, the text cipher becomes more difficult to solve. There are two stages of the encryption process by using two different types of Keys for each stage in securing data

Author Biographies

  • Muhammad Fadlan, Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
    Program Studi Sistem Informasi
  • Sinawati Sinawati, Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
    Program Studi Sistem Informasi
  • Aida Indriani, Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
    Program Studi Teknik Informatika
  • Evi Dianti Bintari, Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) PPKIA Tarakanita Rahmawati
    Program Studi Manajemen Informatika

References

K. Hedström, E. Kolkowska, F. Karlsson, and J. P. Allen, “Value conflicts for information security management,” J. Strateg. Inf. Syst., vol. 20, no. 4, 2011, pp. 373–384.

I. Lopes and P. Oliveira, “New Perspectives in Information Systems and Technologies, Volume 1,” vol. 275, 2014.

M. Fadlan and Hadriansa, “Rekayasa aplikasi kriptografi dengan penerapan kombinasi algoritma knapsack merkle hellman dan affine cipher,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, 2017, pp. 268–274.

Zaeniah and B. E. Purnama, “An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm,” Int. J. Adv. Comput. Sci. Appl., vol. 6, no. 9, 2015, pp. 292–297.

S. Sriadhi, R. Robbi, and A. S. Ahmar, “RC4 Algorithm Visualization for Cryptography Education,” 2nd Int. Conf. Stat. Math. Teaching, Res., pp. 1–10, 2018.

K. Goyal and S. Kinger, “Modified Caesar Cipher for Better Security Enhancement,” Int. J. Comput. Appl., vol. 73, no. 3, 2013, pp. 26–31.

A. Indriani and Sinawati, “Analisa Pengamanan Teks Menggunakan Teknik Character Cipher Dan Block Cipher,” in Prosiding SNST ke-9, 2018, pp. 143–148.

B. Oktaviana and A. P. U. Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR J. Comput. Eng., vol. 18, no. 4, 2016, pp. 26–29.

B. Purnama and H. Rohayani, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted,” Procedia - Procedia Comput. Sci., vol. 59, no. Iccsci, 2015, pp. 195–204.

A. Pradipta, “Implementasi Metode Caesar Chiper Alphabet Majemuk Dalam Kriptografi Untuk Pengamanan Informasi,” Indones. J. Netw. Secur., vol. 5, no. 3, 2016, pp. 3–6.

M. M. Amin, “Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks,” J. Pseudocode, vol. III, no. September, 2016, pp. 129–136.

R. Latifah, S. N. Ambo, and S. I. Kurnia, “Modifikasi Algoritma Caesar Chiper Dan Rail Fence Untuk Peningkatan Keamanan Teks Alfanumerik Dan Karakter Khusus,” in Seminar Nasional Sains dan Teknologi 2017, no. November, 2017, pp. 1–7.

M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J. Sains Komput. Inform., vol. 2, no. 1, 2018, pp. 12–22.

D. R. S. M. Ignatius, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi (Beaufort Dan Vigenere),” in Prosiding SENDI_U 2018, 2018, pp. 978–979.

E. H. Rachmawanto, D. R. Ignatius, M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” Telkomnika, vol. 17, no. 4, 2019, pp. 1750–1757,

K. Alallayah, M. Amin, W. A. El-wahed, and A. Alhamami, “Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier,” Int. Arab J. Inf. Technol., vol. 7, no. 4, 2010, pp. 365–372,

D. Nofriansyah and R. Rahim, “Combination Of Pixel Value Differencing Algorithm With Caesar Algorithm For Steganography,” Int. J. Res. Sci. Eng., vol. 2, no. 6, 2016, pp. 153–159,

I. Gunawan, “Kombinasi algoritma Caesar cipher dan algoritma rsa untuk pengamanan file dokumen dan pesan teks,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, 2018, pp. 124–129,

Downloads

Additional Files

Published

2019-11-27

How to Cite

PENGAMANAN DATA TEKS MELALUI PERPADUAN ALGORITMA BEAUFORT DAN CAESAR CIPHER. (2019). JURNAL TEKNIK INFORMATIKA, 12(2), 149-158. https://doi.org/10.15408/jti.v12i2.12262