PENGUJIAN PENGEMBANGAN TERHADAP ALGORITMA VIGENERE KEY KRIPTOGRAFI
DOI:
https://doi.org/10.31598/jurnalresistor.v5i1.822Keywords:
Keamanan Data, Vinegere Key, Kriptografi, PythonAbstract
The process of digital communication through media that is already integrated with the internet requires a security system in order to prevent confidential data from being acquired by unauthorized third parties and misused by these third parties. In order not to know the confidentiality of the data, techniques and algorithms are needed that can make secret messages not understand the meaning of the secret message. One of the data security techniques is cryptography, which can scramble the arrangement of characters that humans understand into characters that are not understood by humans with various languages. This research is the development of the Vigenere Key Kriptography algorithm for the encryption and decryption process in text messages that include all the characters on the computer keyboard keys. The results of the encryption will be in the form of a.txt file which contains cipher text and the results of the decryption will be plain text that appears in the application text box and the test uses the Python programming language. This research can produce cryptographic techniques that can produce ciphertext of all characters on the computer keyboard keys and can scramble text so that it cannot be understood by human language for data security
Downloads
References
A. P. D. M. I. Databoks. Chatting, “Databoks. Chatting, Aplikasi Paling Digemari Masyarakat Indonesia.,” APJII, 2018. https://databoks.katadata.co.id/datapublish/2018/02/21/chatting-aplikasi-paling-digemari-masyarakat-indonesia.
Apriandala, Rio, 2013, “Sistem Keamanan Menggunakan Rubik Dengan Algoritma Kriptografi Encryption”, Tugas Besar I Makalah Kriptografi, Universitas Bengkulu. 375 Hal
Y. Efrand, Asnawati, “Aplikasi Kriptografi Pesan Menggunakan Algoritma Vigenere Cipher,” J. Media Infotama, 2014.
Doni dan Abu Walad, “Ceasar Cipher Vs Vigenère”, LPKIA, Vol.1 No.3, 2012.
F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., 2016, doi: 10.30872/jim.v10i1.23.
E. L. Hakim, Khairil, and F. H. Utami, “Aplikasi Enkripsi Dan Deskripsi Data Menggunakan Algoritma Rc4 Dengan Menggunakan Bahasa Pemrograman Php,” J. Media Infotama, 2014.
Basri, “KRIPTOGRAFI SIMETRIS DAN ASIMETRIS DALAM PERSPEKTIF KEAMANAN DATA DAN KOMPLEKSITAS KOMPUTASI,” J. Ilm. Ilmu Komput., 2016.
Hallim, Abd, “Pembuatan Perangkat Lunak Media Pembelajaran Kriptografi Klasik”, Surabaya: Politeknik Eletronika Negeri, 2010, Hal. 11.
I. M. Arrijal, R. Efendi, and B. Susilo, “PENERAPAN ALGORITMA KRIPTOGRAFI KUNCI SIMETRIS DENGAN MODIFIKASI VIGENERE CIPHER DALAM APLIKASI KRIPTOGRAFI TEKS,” Pseudocode, 2016, doi: 10.33369/pseudocode.3.1.69-82.
D. Hamdani and J. Junaidi, “Modifikasi Karakter Kode Pada Cipher Hill Menggunakan Kode ASCII,” Eig. Math. J., 2020, doi: 10.29303/emj.v1i2.54.
PCMAG. Definition of ASCII Chart [Online]. Available: https://www.pcmag.com/encyclopedia/term/ascii-chart
Kuswari Hernawati, 2012, Implementasi Cipher Viginere pada kode ASCII dengan Memanfaatkan Digit Desimal Bilangan Euler, Lumbung Pustaka UNY
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Chyquitha Danuputri, Nico Santosa, Fernando Dedi Samuel
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright in each article belongs to the author.
- The authors admit that RESISTOR Journal as a publisher who published the first time under Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
- Authors can include writing separately, regulate distribution of non-ekskulif of manuscripts that have been published in this journal into another version (eg sent to respository institution author, publication into a book, etc.), by recognizing that the manuscripts have been published for the first time in RESISTOR Journal