Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes

  • Mesran Universitas Budi Darma, Medan
  • Surya Darma Nasution Universitas Budi Darma, Medan
Keywords: security, criptography, caesar cipher, compression, stout codes


The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even though the method used is quite modern, the algorithm for breaking ciphertext in cryptography can still be created. For this reason, in this study the authors develop cryptographic security by combining it with data compression. In this study, the algorithm used is the classic cryptographic algorithm, namely Caesar Cipher, combined with the Stout Codes compression algorithm. The results of the Caesar Cipher ciphertext are then compressed by applying the Stout Codes algorithm. From the test results using the Brute Force Atack model, the results are quite good, that the security of the encrypted data is quite good and not easily broken.


Download data is not yet available.


B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext from a Message to Be Encrypted,” Procedia Comput. Sci., vol. 59, no. Iccsci, pp. 195–204, 2015.

P. Verma, G. S. Gaba, and R. Miglani, “Diversified Caesar Cipher for Impeccable Security,” Int. J. Secur. Its Appl., vol. 11, no. 2, pp. 33–40, 2017.

A. Mishra, “Enhancing Security of Caesar Cipher Using Different Methods,” Int. J. Res. Eng. Technol., vol. 02, no. 09, pp. 327–332, 2013.

F. I. Lubis, H. F. S. Simbolon, T. P. Batubara, and R. W. Sembiring, “Combination of Caesar Cipher modification with transposition cipher,” Adv. Sci. Technol. Eng. Syst., vol. 2, no. 5, pp. 22–25, 2017.

P. E. Ismael Imran and P. F. abdulameerabdulkareem, “Enhancement Caesar Cipher for Better Security,” IOSR J. Comput. Eng., vol. 16, no. 3, pp. 01–05, 2014.

O. E. Omolara, A. I. Oludare, and S. E. Abdulahi, “Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication,” Issn, vol. 5, no. 5, pp. 2222–1719, 2014.

A. Jain, R. Dedhia, and A. Patil, “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,” Int. J. Comput. Appl., vol. 129, no. 13, pp. 6–11, 2015.

I. W. Utomo, R. Latifah, and D. Risanty, “Aplikasi Kriptografi Berbasis Android Menggunakan Algoritma Caesar Cipher dan Vigenere Cipher,” J. Sist. Informasi, Teknol. Inf. dan Komput., vol. 9, no. 2, pp. 142–149, 2018.

P. N. Arifah and W. A. Basuki, “Implementasi Kriptografi Caesar Cipher,” Semin. Mat. DAN Pendidik. Mat. UNY 2017, pp. 297–304, 2017.

M. L. Wijaya, K. Yulianti, and H. S. Husain, “Caesar Cipher Dan Affine Cipher Untuk Mengubah Pesan Rahasia,” E u r e k a M a t i k a, vol. 5, no. 1, pp. 30–45, 2017.

R. Sharma and S. Bollavarapu, “Data Security using Compression and Cryptography Techniques,” Int. J. Comput. Appl., vol. 117, no. 14, pp. 15–18, 2015.

S. K. Verma and D. B. Ojha, “An innovative Enciphering Scheme based on Caesar Cipher,” Int. J. Innov. Sci. Eng. Technol., vol. 1, no. 5, pp. 25–27, 2014.

F. N. Nife, “A New Modified Caesar Cipher Cryptographic Method Along With Rail Fence to Encrypt Message 1-Dynamic Key Generation,” Int. J. Adv. Res., vol. 3, no. 2, pp. 331–335, 2015.

Y. Dwi Putri, R. Rosihan, and S. Lutfi, “Penerapan Kriptografi Caesar Cipher Pada Fitur Chatting Sistem Informasi Freelance,” JIKO (Jurnal Inform. dan Komputer), vol. 2, no. 2, pp. 87–94, 2019.

B. Oktaviana and A. P. Utama Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR J. Comput. Eng., vol. 18, no. 04, pp. 26–29, 2016.

S. Y. Wulandari, “Cryptography : A Combination of Caesar and Affine Cipher to Conceal the Message,” PROC. INTERNAT. CONF. SCI. ENGIN., vol. 3, no. April, pp. 741–744, 2020.

L. Marlina, A. Putera, U. Siahaan, H. Kurniawan, and I. Sulistianingsih, “Data Compression Using Elias Delta Code,” Int. J. Recent Trends Eng. Res., vol. 3, no. 8, pp. 210–217, 2017.

S. D. Nasution, “Data Compression Using Stout Codes,” IJICS (International J. Informatics Comput. Sci., vol. 3, no. 1, pp. 28–33, 2019.

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.

A. Singh and Y. Bhatnagar, “Enhancement of Data Compression Using Incremental Encoding,” Int. J. Sci. Eng. Res., vol. 3, no. 5, pp. 1457–1465, 2012.

D. Salomon, D. Bryant, and G. Motta, "Handbook of Data Compression (Google eBook)", Fifth. Springer, 2010.

How to Cite
Mesran, M., & Nasution, S. D. (2020). Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(6), 1209 -.
Information Technology Articles