Muhammad Fadlan, Sinawati Sinawati, Aida Indriani, Evi Dianti Bintari


The importance of maintaining data integrity and security is one of the challenges in the current digital era. One method that can be used to face this challenge is through cryptography. In cryptography there are several algorithms that can be used, one of which is the Caesar cipher algorithm. This algorithm has several disadvantages, including a limited number of characters of 26 characters. This can make the encryption results easily recognizable by other parties. This study aims to design a proposal for maintaining data security through cryptographic techniques, while addressing the problems inherent in the Caesar cipher algorithm. The combination of Caesar and Beaufort algorithm is done to overcome the existing problems. In addition, a character list of 94 characters was determined to be used in the process of encryption and decryption of text data. The result, through the integration of these two algorithms, the text cipher becomes more difficult to solve. There are two stages of the encryption process by using two different types of Keys for each stage in securing data


Beaufort; Caesar; Kriptografi; Keamanan Data

Full Text:



K. Hedström, E. Kolkowska, F. Karlsson, and J. P. Allen, “Value conflicts for information security management,” J. Strateg. Inf. Syst., vol. 20, no. 4, 2011, pp. 373–384.

I. Lopes and P. Oliveira, “New Perspectives in Information Systems and Technologies, Volume 1,” vol. 275, 2014.

M. Fadlan and Hadriansa, “Rekayasa aplikasi kriptografi dengan penerapan kombinasi algoritma knapsack merkle hellman dan affine cipher,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, 2017, pp. 268–274.

Zaeniah and B. E. Purnama, “An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm,” Int. J. Adv. Comput. Sci. Appl., vol. 6, no. 9, 2015, pp. 292–297.

S. Sriadhi, R. Robbi, and A. S. Ahmar, “RC4 Algorithm Visualization for Cryptography Education,” 2nd Int. Conf. Stat. Math. Teaching, Res., pp. 1–10, 2018.

K. Goyal and S. Kinger, “Modified Caesar Cipher for Better Security Enhancement,” Int. J. Comput. Appl., vol. 73, no. 3, 2013, pp. 26–31.

A. Indriani and Sinawati, “Analisa Pengamanan Teks Menggunakan Teknik Character Cipher Dan Block Cipher,” in Prosiding SNST ke-9, 2018, pp. 143–148.

B. Oktaviana and A. P. U. Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR J. Comput. Eng., vol. 18, no. 4, 2016, pp. 26–29.

B. Purnama and H. Rohayani, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted,” Procedia - Procedia Comput. Sci., vol. 59, no. Iccsci, 2015, pp. 195–204.

A. Pradipta, “Implementasi Metode Caesar Chiper Alphabet Majemuk Dalam Kriptografi Untuk Pengamanan Informasi,” Indones. J. Netw. Secur., vol. 5, no. 3, 2016, pp. 3–6.

M. M. Amin, “Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks,” J. Pseudocode, vol. III, no. September, 2016, pp. 129–136.

R. Latifah, S. N. Ambo, and S. I. Kurnia, “Modifikasi Algoritma Caesar Chiper Dan Rail Fence Untuk Peningkatan Keamanan Teks Alfanumerik Dan Karakter Khusus,” in Seminar Nasional Sains dan Teknologi 2017, no. November, 2017, pp. 1–7.

M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J. Sains Komput. Inform., vol. 2, no. 1, 2018, pp. 12–22.

D. R. S. M. Ignatius, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi (Beaufort Dan Vigenere),” in Prosiding SENDI_U 2018, 2018, pp. 978–979.

E. H. Rachmawanto, D. R. Ignatius, M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” Telkomnika, vol. 17, no. 4, 2019, pp. 1750–1757,

K. Alallayah, M. Amin, W. A. El-wahed, and A. Alhamami, “Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier,” Int. Arab J. Inf. Technol., vol. 7, no. 4, 2010, pp. 365–372,

D. Nofriansyah and R. Rahim, “Combination Of Pixel Value Differencing Algorithm With Caesar Algorithm For Steganography,” Int. J. Res. Sci. Eng., vol. 2, no. 6, 2016, pp. 153–159,

I. Gunawan, “Kombinasi algoritma Caesar cipher dan algoritma rsa untuk pengamanan file dokumen dan pesan teks,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, 2018, pp. 124–129,

DOI: Abstract - 0 PDF - 0


  • There are currently no refbacks.

Copyright (c) 2019 Muhammad Fadlan, Sinawati Sinawati, Aida Indriani, Evi Dianti Bintari

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur.
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537

Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at


JTI Visitor Counter: View JTI Stats

 Flag Counter