Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom

Data Security through Autokey Cipher Super Encryption Model and Column Transposition

  • Muhammad Fadlan STMIK PPKIA Tarakanita Rahmawati
  • Haryansyah
  • Rosmini
Keywords: autokey, crytography, data, transposition, super encryption

Abstract

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.

 

Downloads

Download data is not yet available.

References

N. Matondang, I. N. Isnainiyah, and A. Muliawatic, “Analisis Manajemen Risiko Keamanan Data Sistem Informasi (Studi Kasus: RSUD XYZ),” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 2, no. 1, pp. 282–287, 2018, doi: 10.29207/resti.v2i1.96.

P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” Procedia Comput. Sci., vol. 125, no. 2009, pp. 691–697, 2018, doi: 10.1016/j.procs.2017.12.089.

R. Ravida and H. A. Santoso, “Advanced Encryption Standard (AES) 128 Bit for Hydroponic Plant Internet of Things (IoT) Data Security,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 6, pp. 1157–1164, 2020, doi: 10.29207/resti.v4i6.2478.

F. Triana, J. Endri, and I. Salamah, “Implementasi Teknik Kriptografi CAESAR CIPHER Untuk Keamanan Data Informasi Berbasis Android,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 4, pp. 627–634, 2020, doi: 10.29207/resti.v4i4.1984.

M. K. Harahap, “Analisis Perbandingan Algoritma Kriptografi Klasik Vigenere Cipher Dan One Time Pad,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 61–64, 2016, doi: 10.30743/infotekjar.v1i1.43.

P. Poonia and P. Kantha, “Comparative Study of Various Substitution and Transposition Encryption Techniques,” Int. J. Comput. Appl., vol. 145, no. 10, pp. 24–27, 2016, doi: 10.5120/ijca2016910783.

D. Abdullah et al., “Super-Encryption Cryptography with IDEA and WAKE Algorithm,” J. Phys. Conf. Ser., vol. 1019, no. 1, 2018, doi: 10.1088/1742-6596/1019/1/012039.

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018, doi: 10.1088/1742-6596/978/1/012086.

A. Djamalilleil, M. Muslim, Y. Salim, E. I. Alwi, H. Azis, and Herman, “Modified Transposition Cipher Algorithm for Images Encryption,” in Proceedings - 2nd East Indonesia Conference on Computer and Information Technology: Internet of Things for Industry, EIConCIT 2018, 2018, pp. 1–4, doi: 10.1109/EIConCIT.2018.8878326.

M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018, doi: 10.24843/mite.2018.v17i01.p08.

R. Septiana, A. F. Hastawan, R. C. Aryani, and V. Marsha, “Implementasi Algoritma Modifikasi Transposisi Columnar Pada Bot Telegram,” Edu Komputika J., vol. 7, no. 2, pp. 84–93, 2020, doi: 10.15294/edukomputika.v7i2.42479.

A. B. Nasution, “Implementasi Pengamanan Data Dengan Menggunakan Algoritma Caesar Cipher Dan Transposisi Cipher,” J. Teknol. Inf., vol. 3, no. 1, p. 1, 2019, doi: 10.36294/jurti.v3i1.680.

O. Grošek, E. Antal, and T. Fabšič, “Remarks on breaking the Vigenère autokey cipher,” Cryptologia, vol. 43, no. 6, pp. 486–496, 2019, doi: 10.1080/01611194.2019.1596997.

G. Lasry, N. Kopal, and A. Wacker, “Cryptanalysis of columnar transposition cipher with long keys,” Cryptologia, vol. 40, no. 4, pp. 374–398, 2016, doi: 10.1080/01611194.2015.1087074.

P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Procedia Comput. Sci., vol. 78, no. December 2015, pp. 617–624, 2016, doi: 10.1016/j.procs.2016.02.108.

H. N. Noor Muchsin, D. E. Sari, D. R. Ignatius Moses Setiadi, and E. H. Rachmawanto, “Text Encryption using Extended Bit Circular Shift Cipher,” in Proceedings of 2019 4th International Conference on Informatics and Computing, ICIC 2019, 2019, pp. 0–4, doi: 10.1109/ICIC47613.2019.8985708.

K. D. Muthavhine and M. Sumbwanyambe, “An analysis and a comparative study of cryptographic algorithms used on the Internet of Things (IoT) based on avalanche effect,” 2018 Int. Conf. Inf. Commun. Technol. ICOIACT 2018, vol. 2018-Janua, pp. 114–119, 2018, doi: 10.1109/ICOIACT.2018.8350759.

Published
2021-12-30
How to Cite
Muhammad Fadlan, Haryansyah, & Rosmini. (2021). Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 5(6), 1113 - 1119. https://doi.org/10.29207/resti.v5i6.3566
Section
Information Technology Articles