Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes
Abstract
The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even though the method used is quite modern, the algorithm for breaking ciphertext in cryptography can still be created. For this reason, in this study the authors develop cryptographic security by combining it with data compression. In this study, the algorithm used is the classic cryptographic algorithm, namely Caesar Cipher, combined with the Stout Codes compression algorithm. The results of the Caesar Cipher ciphertext are then compressed by applying the Stout Codes algorithm. From the test results using the Brute Force Atack model, the results are quite good, that the security of the encrypted data is quite good and not easily broken.
Downloads
References
B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext from a Message to Be Encrypted,” Procedia Comput. Sci., vol. 59, no. Iccsci, pp. 195–204, 2015.
P. Verma, G. S. Gaba, and R. Miglani, “Diversified Caesar Cipher for Impeccable Security,” Int. J. Secur. Its Appl., vol. 11, no. 2, pp. 33–40, 2017.
A. Mishra, “Enhancing Security of Caesar Cipher Using Different Methods,” Int. J. Res. Eng. Technol., vol. 02, no. 09, pp. 327–332, 2013.
F. I. Lubis, H. F. S. Simbolon, T. P. Batubara, and R. W. Sembiring, “Combination of Caesar Cipher modification with transposition cipher,” Adv. Sci. Technol. Eng. Syst., vol. 2, no. 5, pp. 22–25, 2017.
P. E. Ismael Imran and P. F. abdulameerabdulkareem, “Enhancement Caesar Cipher for Better Security,” IOSR J. Comput. Eng., vol. 16, no. 3, pp. 01–05, 2014.
O. E. Omolara, A. I. Oludare, and S. E. Abdulahi, “Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication,” Issn, vol. 5, no. 5, pp. 2222–1719, 2014.
A. Jain, R. Dedhia, and A. Patil, “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,” Int. J. Comput. Appl., vol. 129, no. 13, pp. 6–11, 2015.
I. W. Utomo, R. Latifah, and D. Risanty, “Aplikasi Kriptografi Berbasis Android Menggunakan Algoritma Caesar Cipher dan Vigenere Cipher,” J. Sist. Informasi, Teknol. Inf. dan Komput., vol. 9, no. 2, pp. 142–149, 2018.
P. N. Arifah and W. A. Basuki, “Implementasi Kriptografi Caesar Cipher,” Semin. Mat. DAN Pendidik. Mat. UNY 2017, pp. 297–304, 2017.
M. L. Wijaya, K. Yulianti, and H. S. Husain, “Caesar Cipher Dan Affine Cipher Untuk Mengubah Pesan Rahasia,” E u r e k a M a t i k a, vol. 5, no. 1, pp. 30–45, 2017.
R. Sharma and S. Bollavarapu, “Data Security using Compression and Cryptography Techniques,” Int. J. Comput. Appl., vol. 117, no. 14, pp. 15–18, 2015.
S. K. Verma and D. B. Ojha, “An innovative Enciphering Scheme based on Caesar Cipher,” Int. J. Innov. Sci. Eng. Technol., vol. 1, no. 5, pp. 25–27, 2014.
F. N. Nife, “A New Modified Caesar Cipher Cryptographic Method Along With Rail Fence to Encrypt Message 1-Dynamic Key Generation,” Int. J. Adv. Res., vol. 3, no. 2, pp. 331–335, 2015.
Y. Dwi Putri, R. Rosihan, and S. Lutfi, “Penerapan Kriptografi Caesar Cipher Pada Fitur Chatting Sistem Informasi Freelance,” JIKO (Jurnal Inform. dan Komputer), vol. 2, no. 2, pp. 87–94, 2019.
B. Oktaviana and A. P. Utama Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR J. Comput. Eng., vol. 18, no. 04, pp. 26–29, 2016.
S. Y. Wulandari, “Cryptography : A Combination of Caesar and Affine Cipher to Conceal the Message,” PROC. INTERNAT. CONF. SCI. ENGIN., vol. 3, no. April, pp. 741–744, 2020.
L. Marlina, A. Putera, U. Siahaan, H. Kurniawan, and I. Sulistianingsih, “Data Compression Using Elias Delta Code,” Int. J. Recent Trends Eng. Res., vol. 3, no. 8, pp. 210–217, 2017.
S. D. Nasution, “Data Compression Using Stout Codes,” IJICS (International J. Informatics Comput. Sci., vol. 3, no. 1, pp. 28–33, 2019.
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.
A. Singh and Y. Bhatnagar, “Enhancement of Data Compression Using Incremental Encoding,” Int. J. Sci. Eng. Res., vol. 3, no. 5, pp. 1457–1465, 2012.
D. Salomon, D. Bryant, and G. Motta, "Handbook of Data Compression (Google eBook)", Fifth. Springer, 2010.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;