Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher
Main Article Content
Abstract
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plaintext using ROT13, followed by encrypting the result using Vernam Cipher with an inputted key, and then encrypting the output again using Stream Cipher. The advantages of this combination model include enhanced data security, as demonstrated by the three-stage encryption and decryption process.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to JTIK journal and Research Division, KITA Institute as the publisher of the journal. Copyright encompasses rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations.
JTIK journal and Research Division, KITA Institute and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in JTIK journal are the sole and exclusive responsibility of their respective authors and advertisers.
The Copyright Transfer Form can be downloaded here: [Copyright Transfer Form JTIK]. The copyright form should be signed originally and send to the Editorial Office in the form of original mail, scanned document or fax :
Muhammad Wali (Editor-in-Chief)
Editorial Office of Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)
Research Division, KITA Institute
Teuku Nyak Arief Street Nomor : 7b, Lamnyong, Lamgugop, Kota Banda Aceh
Telp./Fax: 0651-8070141
Email: jtik@lembagakita.org - journal@lembagakita.org
References
Azmi, F. and Erika, W., 2017. Analisis keamanan data pada block cipher algoritma Kriptografi RSA. CESS (Journal of Computer Engineering, System and Science), 2(1), pp.27-29. DOI: https://doi.org/10.24114/cess.v2i1.4967.
Manullang, A.S., Puspasari, R. and Verina, W., 2020. Penyandian Database Menggunakan Metode Base64 Dan Rot13. Jurnal Mahasiswa Fakultas Teknik dan Ilmu Komputer, 1(1), pp.283-292.
Siahaan, K.N. and Mesran, M., 2020. Penerapan Algoritma Venigmare Cipher dan Vernam Cipher Dalam Pengamanan Data Teks. Jurnal Sistem Komputer dan Informatika (JSON), 2(1), pp.48-52. DOI: 10.30865/json.v2i1.2457.
Haji, W.H. and Mulyono, S., 2012. Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI).
Lestari, D. and Riyanto, M.Z., 2012. Suatu Algoritma Kriptografi Stream Cipher Berdasarkan Fungsi Chaos. no. November, pp.978-979.
Fatonah, S., Yulandari, A. and Ariyus, D., 2019. Analisis Penerapan Modifikasi Algoritma Vigenere Cipher, Caesar Cipher, Vernam Cipher dan Hill Cipher Untuk Penyisipan Pesan Dalam Gambar. Jurnal VOI (Voice Of Informatics), 8(2).
Pratama, D.A. and Kurniawan, H., 2020. Aplikasi Keamanan Teks SMS Menggunakan Metode Stream Cipher, ROT13, Dan Caesar Cipher Berbasis Android. Jurnal Mahasiswa Fakultas Teknik dan Ilmu Komputer, 1(1), pp.274-282.
Firmansyah, M.H.D., 2021. Aplikasi Enkripsi Dan Dekripsi Dengan Teknik XOR Menggunakan Metode Vernam Cipher. Kumpulan Karya Ilmiah Mahasiswa Fakultas sains dan Tekhnologi, 2(2), pp.8-8.
Prasetiyo, B., Muslim, M.A. and Susanto, H., 2017. Penerapan Kriptografi Algoritma Blowfish pada Pengamanan Pesan Data Teks. Techno. Com, 16(4), pp.358-366. DOI: 10.33633/tc.v16i4.1452.
Amin, M.M., 2016. Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks. Pseudocode, 3(2), pp.129-136. DOI: 10.33369/pseudocode.3.2.129-136.
Ariyus, D., 2008. Pengantar ilmu kriptografi: teori analisis & implementasi. Penerbit Andi.
Hendrik, H., 2020. Kombinasi Algoritma Huffman dan Algoritma ROT 13 Dalam Pengamanan File Docx. Journal of Information System Research (JOSH), 2(1), pp.40-46.
Manurung, D.P., Puspasari, R. and Verina, W., 2020. Perbandingan Metode Stream Dengan Metode Caesar Cipher Terhadap Pengiriman Pesan Pada Jaringan Wireless LAN. Jurnal Mahasiswa Fakultas Teknik dan Ilmu Komputer, 1(1), pp.332-342.
Sihombing, M.L., 2019. Penerapan Algoritma Vernam Cipher (One Time) untuk Pengamanan Login. Pelita Informatika: Informasi dan Informatika, 7(3), pp.429-432.