14 research outputs found

    Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication

    Get PDF
    Many Ciphers have been developed to provide data security. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by developing a new modified hybrid way of encryption of plaintext. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper, a modified hybrid of Caesar Cipher and Vigenere Cipher with diffusion and confusion which Classical ciphers cannot boast of is proposed. The Caesar Cipher and Vigenere Cipher have been modified and expanded so as to include alphabets, numbers and symbols and at the same time introduced a complete confusion and diffusion into the modified cipher developed. Classical ciphers can be made effective and used for providing security by adding the properties possessed by the modern ciphers. In this paper, the characteristics of modern cipher were incorporated to classical cipher. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties in which the modified hybrid of both the Caesar Cipher and Vigenere Cipher is now made a very strong cipher and difficult to break using a frequency method, brute force, etc. Keywords: Encryption, Decryption, Substitution, Cipher, Random Number, Recursive, Primitive Root, Plaintext, Cipher Text, Optimizatio

    Analisa Algoritma Ciphers Transposition: Study Literature

    Get PDF
    Technological developments allow the sending and storage of data can be done quickly, easily, practically, and safely. One security used uses cryptographic techniques. Cryptography is a technique of converting original text (plaintext) into secret text (ciphertext) using cryptographic algorithms (ciphers) or what is called the encryption process. The decryption process is the process of converting data encoded into original data. One of the cryptographic algorithms is the Cipher Transposition Algorithm. The analysis aims to determine the characteristics and application of the Transposition Cipher. The method used in this study by means of Study Literature, analyzes previous research from journals related to the Transposition Cipher Algorithm. The results are in the form of a view using the study literature method and knowing the characteristics and application of the Cipher Transposition algorithm and analyzing trends in previous studies. Kata Kunci : Cryptography, Algorithms, Cipher Transposition, Study literatur

    Analisa Algoritma Ciphers Transposition: Study Literature

    Get PDF
    Technological developments allow the sending and storage of data can be done quickly, easily, practically, and safely. One security used uses cryptographic techniques. Cryptography is a technique of converting original text (plaintext) into secret text (ciphertext) using cryptographic algorithms (ciphers) or what is called the encryption process. The decryption process is the process of converting data encoded into original data. One of the cryptographic algorithms is the Cipher Transposition Algorithm. The analysis aims to determine the characteristics and application of the Transposition Cipher. The method used in this study by means of Study Literature, analyzes previous research from journals related to the Transposition Cipher Algorithm. The results are in the form of a view using the study literature method and knowing the characteristics and application of the Cipher Transposition algorithm and analyzing trends in previous studies. Kata Kunci : Cryptography, Algorithms, Cipher Transposition, Study literatur

    Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher

    Get PDF
    The achievement of visual aspects and image security often cannot meet visibility standards, for example the acquisition of PSNR and UACI NPCR values. To increase security, this research has implemented a combination of the Vigenere cipher and Beaufort and the use of Fibonacci as a randomizer. The combination of the Vigenere Cipher and Beaufort Cipher substitution algorithms with the Fibonacci technique can be applied to encrypt color images in RGB and CMY, with a size of 256x256 pixels and in .bmp format. The Fibonacci cut-off value used in this study is 10000. The highest entropy value of the cipher image peppers.bmp is 7,991. The lowest PSNR cipher image value is accordion.bmp where for RGB it is 5,439 dB and for CMY it is 5,403 dB. accordion.bmp's highest UACI value is 44.018% for RGB and 44.312% for CMY. The NPCR value in the airplane.bmp image has the highest value in RGB of 99.792% and for CMY the highest value is in splash.bmp with a value of 99.798%. Evaluation of the decryption results shows that the decryption process can run perfectly as indicated by the values of MSE=0, PSNR=inf, UACI and NPCR=0%. Therefore, encrypt and decrypt was proven that the results obtained in the visual aspect are very good

    Implementasi Algoritma Merkle-Hellman Knapsack dalam Penyandian Record Database

    Get PDF
    A lot of data is misused without the data owner being aware of it. Software developers must ensure the security user data on their system. Due to the size of the market that houses data, the security of record databases must be of great concern. Cryptographic systems or data encryption can be used for data security. The Merkle-Hellman Knapsack algorithm is included in public-key cryptography because it uses different keys for the encryption and decryption processes. This algorithm belongs to the NP-complete algorithm which cannot be solved in polynomial order time. This algorithm has stages of key generation, encryption, and decryption. The results of this study secure database records from theft by storing records in the form of ciphertext/password. Ciphertext generated by algorithmic encryption has a larger size than plaintext

    Implementasi Algoritma Super Enkripsi Vigenere Cipher dan Route Cipher pada Penyandian Pesan Teks

    Get PDF
    Kemajuan teknologi diiringi dengan meningkatnya ancaman terhadap keamanan serta kerahasiaan informasi pada pesan. Salah satu cara untuk mengamankan pesan dapat menggunakan teknik super enkripsi. Super enkripsi merupakan suatu konsep yang menggunakan kombinasi dariciphersubstitusi dan cipher transposisi untuk meningkatkan keamanan pesan. Cipher substitusi adalah metode untuk merubah setiap karakter pesan melalu ioperasi matematika. Cipher transposisi adalah metode untuk merubah susunansetiap karakter pesan. Pada penelitian ini, Vigenere cipher sebagai cipher substitusi dan route cipher sebagai cipher transposisi. Penelitian ini bertujuan untuk mengimplementasikan algoritma super enkripsi Vigenere cipher dan route cipher pada penyandian pesan teks. Penyandian pesan dimulai dengan enkripsi menggunakan persamaan Vigenere cipher kemudian dienkripsi kembali menggunakan route cipher dengan merubah susunan karakter pesan sesuai rute kunci. Pengembalian pesan atau dekripsi dimulai dengan route cipher lalu didekripsi kembali menggunakan Vigenere cipher. Proses penyandian dan pengembalian pesan akan diimplementasikan menggunakan bahasa program PHP. Kata kunci : Super enkripsi, Vigenere cipher, Route cipher, Enkripsi, Dekrips

    IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA

    Get PDF
    Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties. The columnar transposition algorithm is one simple transposition password. Columnar transposition is one of the classic cryptographic algorithms. Columnar transposition is one part of the transposition cipher with cryptographic method where the message is written in a row from a specified length, and then the column per column is read again with a reading sequence based on a keyword. Series length is determined by the length of the keyword. The order of column readings is based on column order. RSA Algorithm is one of asymmetric cryptography, which is a type of cryptography that uses two different keys: public key and private key. Thus, there is one key, namely the public key, which can be sent through a free channel, without any particular security. In this case there are two keys arranged so that they have a relationship in modulo arithmetic equation. In this case, combining both columnar transposition algorithms and RSA algorithms allows security in the form of message data to be very effective for locking the data even better. Keywords: Cryptography, Columnar Transposition, RSA, Jav

    Healthy food intake advisor using decision support system

    Get PDF
    : The difficulties to decide the food to eat and do not have enough knowledge that what foods should be avoided when pregnant or when facing some health problem. Healthy Food Advisor is an Android based application which acts as a healthy controller to all of the users. The purpose of developing this application is to suggest healthy food to users based on their personal condition in order to make them have a healthy lifestyle. Users are required to record all of the details such as age, height and weight, so the application and calculate the Body Mass Index (BMI) value and ca loric needs to user. Application will recommended the most suitable food lists to users according to their personal condition. Through this application, users no longer need to spend more time to think on a meal and busy to search from online that the nutrition information of food. The methodology used to develop this Android based application is Object-oriented Software Development (OOSD) model. Software technology used to develop this application is Ionic Framework where this technology uses web technology language to develop mobile hybrid application. Database used for this system is Firebase while programming language used to develop this application is AngularJS, HTML, TypeScript and SCSS. Hereby, this application is able to provide a simple and portable solution to help people decide the food and increase the knowledge of the public
    corecore