• Tidak ada hasil yang ditemukan

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

N/A
N/A
Protected

Academic year: 2023

Membagikan "Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission"

Copied!
8
0
0

Teks penuh

(1)

Abstracting & IndexingMost Accessed ArticlesMost Downloaded

ArticlesMost Cited Articles

Editor In chief:

Dr. Vikas Jain

Alembic Research Center, Vadodara, India

Scientific Editors:

(2)

Prof. Anastasios Doulamis

National Technical University of Athens 157 73 Zografou, Athens, Greece

Email: adoulam@cs.ntua.gr

Scopus Id =35565008000 , H-index: 24 , Citation: 2406 Prof.Ashraf A.El-Bindary,

Chairman of Chemistry Department, Faculty of Science, Demiatta Universitry, Demiatta. Egypt Scopus Id H- Index- 28

Prof.Shirley Shidu Yan,

Department of Pharmacology & Toxicology, School of Pharmacy,

The University of Kannas USA Scopus Id

Dr.Robbi Rahim

Sekolah Tinggi Ilmu Manajemen Sukma, Indonesia

Scopus Id

Dr. Manal Abdullah,

Associate Professor, Information Systems Department King Abdulaziz University,

Jeddah, Saudi Arabia.

Scopus Id: 25222478500

Email: maaabdullah@kau.edu.sa

Dr.P.Victer Paul,

Department of Computer Science and Engineering

Indian Institute of Information Technology Kottayam- 686635 Email:victorpaul@iiitkottayam.ac.in, victerpaul@gmail.com Scopus Id =37020706700

Editorial Board Members

Dr.Safwan Moh'd Abdel-Hamid Fraihat, Chemistry Department, Faculty of Science, The University of Jordan, Amman,

Jordan Scopus ID

Dr.Shivkanya Fuloria, Faculty of Pharmacy,

Asian Institute of Medicine, Science & Technology, Bedong, Malaysia

Scopus Id

(3)

Dr.Sumit Goswami, Senior Scientist,

Biotherpeutics Formulation & Process Development at Pfizer Inc.

Pfizer Inc., New York, United States Scopus Id

Dr.Yanna Carolina Ferreira Teles, Universidade Federal da Paraiba,

Joao Pessoa, Brazil Scopus Id

• Dr. Shashank Kumar,

Department of Biochemistry, University of Allahabad, Allahabad India

• Dr. S. Ahmed John,

P. G. and Research Department of Botany, Jamal Mohamed College

(Autonomous), Tiruchirappalli India

• Dr. K. Madhava Chetty,

Department of Botany, SVUCS, S. V. University, Tirupati, Andhra

Pradesh India

• Dr. Javad Sharifi Rad,

Department of Pharmacognosy, Faculty of Pharmacy, Zabol University

of Medical Sciences, Zabol Iran

• Dr. C. Jayakumar,

Department of Chemical Engineering, A. C. Technology, Anna

University, Chennai India

• Dr. Shrikaant Kulkarni,

Faculty of Chemistry, VIT, Pune India

• Dr. Sushil Kumar Middha,

Maharani Lakshmi Ammanni College For Women, Bangalore India

• Dr. Koteswara Rao Valasani,

School of Pharmacy, University of Kansas USA

• Dr. Fukai Frank Bao,

Department of Microbiology and Immunology, Kunming Medical

University China

• Mr. Rajesh Kumar Suman,

Department Of Pharmacology, MGM Institute of Health Sciences, Navi

Mumbai India

• Mr. E. Selvarajan,

Dept of Biotechnology, VIT University India

(4)

• Dr. Asim Ahmed Elnour Ahmed,

Consultant Clinical Pharmacist UAE

• Dr. Tianxiang (Kevin) Han,

Bristol-Myers Squibb, Princeton, NJ. Research Investigator, Metabolism

and Pharmacokinetics China

• Dr. Jagdish Labhubhai Kakadiya,

Jodhpur National University, Jodhpur India

• Dr. Mohammed Rafiqkhan K,

Department of Biotechnology, Sree Narayana Guru College, Coimbatore India

• Mr. G. Chelladurai,

Dept of Zoology, Kamaraj College, Manonmaniam sundaranar University,

Thoothukudi India

• Dr. Shashank Jain,

Formulation Scientist at Akorn Pharmaceutical, NY USA

• Mr. Satyajit Tripathy,

Dept. of Physiology, Vidyasagar University. West Bengal India

• Dr. Dilipkumar Pal,

Institute of Pharmaceutical Sciences, Guru Ghasidas Viswavidyalaya

(A Central University), Koni, Bilashpur India

• Dr. Kiran K. Akula,

Department of Biology & Biochemistry, University of Houston Texas

• Dr. Syeda Ghazala Rizvi,

Dept of zoology, FUUAS, Karachi Pakistan

• Dr. Jiyauddin Khan,

School of Pharmacy, Management & Science University, Shah Alam, Selangor

Darul Ehsan Malasiya

• Dr. Tapan G. Modi,

Dental Science and Research Centre, Bopal, Ahmedabad India

• Dr. Mohammad Ali Ebrahimzadeh,

Department of Medicinal Chemistry, School of Pharmacy, Mazandaran

University of Medical Sciences, Sari Iran

• Dr. Ravi S Shukla,

University of Missouri-Kansas City, Kansas City, Missouri Usa

• Dr. P. Parthiban,

Vel Tech Multi Tech Dr. RR Dr SR Engineering College, Avadi, Chennai India

(5)

Journal of critical reviews 76

Journal of Critical Reviews

ISSN- 2394-5125 Vol 7, Issue 1, 2020

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Andini Dani Achmad

1

, Ayu Aryista Dewi

2

, Muhammad Roy Purwanto

3

, Phong Thanh Nguyen

4*

, Imam Sujono

5

1Universitas Hasanuddin, Makassar, Indonesia. Email: andini.achmad@gmail.com

2Universitas Udayana, Bali, Indonesia

3Universitas Islam Indonesia, Indonesia

4Department of Project Management, Ho Chi Minh City Open University, Vietnam. Email: phong.nt@ou.edu.vn

5Sekolah Tinggi Agama Islam Taruna Surabaya, Surabaya, Indonesia Received: 11.10.2019 Revised: 12.11.2019 Accepted: 13.12.2019

Abstract:

Data theft is the process of stealing digital information from victims who do not know it in order to jeopardize privacy or obtain confidential information. Data theft becomes a problem for individual computer users, as well as large companies. Every individual has not covered the possibility of information theft because of someone's negligence. In safeguarding data, we need a technique that can help someone in keeping the data a secret. Data theft is unavoidable, but data security can be improved to preve nt data misuse.

Vigenere algorithm, which is a cryptographic technique, can help secure data from data misuse. This algorithm works by shifti ng each character in the plaintext for the key provided. The key used can be a series of characters or are words that are difficult to guess by people who want to commit a crime. Implementing the Vigenere Cipher algorithm will guarantee data security.

Key Words: Vigenere Cipher, encryption, decryption, algorithm

© 2019 by Advance Scientific Research. This is an open-access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/ ) DOI:

http://dx.doi.org/10.22159/jcr.07.01.15 INTRODUCTION

Information is the most valuable asset to be protected by theft [1]. Data can be in the form of important information that should not be widely spread because it has dangerous or vital content. Delivery of this type of information must be done carefully and not known by other people. If the information is stolen and falls into the hands of people who are not responsible, then this information can be misused or used as a source of illegal money search [2]. To secure that information, good techniques are needed in turning that information into string words that cannot be understood by others. In the computer world, the tools to do this are called cryptography. Cryptography is the art of turning an original message into an unread message so that the message cannot be understood when taken by an irresponsible person.

Cryptography is not easy in general [3]. But there are lots of easy cryptographic techniques. Cryptographic methods are safe enough to be used and can be a defense to avoid attacks [4]. The method used for data security in this study is the Vigenere Cipher. This method is one of the substitution methods in which the plaintext character will be replaced by the characters in the ASCII table by shifting the character's position with a key. In the encryption process, this algorithm uses a way to encrypt plaintext into ciphertext so that the original message is encoded. Encryption algorithms are functions that are used to perform encryption and decryption functions.

THEORIES 2.1 Data

Data is a very important information that must be kept confidential. Data can be in the form of mediocre information or information that is very important where other people may not know the contents of the data.Data is parts of digital information. It is usually formed in certain ways and can be in various ways, such as numbers or text It is information in binary digital format. Data is a kind of technological information. It identifes the information from its source and splits into a seperate small information [5]–

[7].

2.2 Cryptography

Cryptography is the ability of encryption methods where the

"original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key [8].

Decryption using the decryption key can recover the original data. The probability of retrieving the original manuscript by someone who does not have the decryption key for a short time is very small. The encryption technique used in classical cryptography is symmetric encryption, where the decryption key is the same as the encryption key. For public- key cryptography, asymmetric encryption techniques are needed where the decryption key is not the same as the encryption key. Encryption, decryption, and key generation for asymmetric encryption techniques require more intensive computation than symmetric encryption because asymmetric encryption uses huge numbers [9].

2.2 Vigenere Cipher

Vigenère cipher is a method of encoding the alphabet text by using a series of Caesar passwords based on the letters on the keywords. The Vigenère password is a simple form of a polyalphabetic substitution code. The advantage of this password compared to Caesar and other monoalphabetic codes are that they are not so vulnerable to a decoding method called frequency analysis [10]. The vigènere code is a polyalphabetic substitution cipher. It was published by a French diplomat (and also a cryptologist), Blaise de Vigènere, in the 16th century, 1586. Giovan Batista Belasco described it for the first time in 1533, as written in the book La Cifra del Sig. This algorithm was widely known 200 years later and was called the code vigènere. Vigènere was the trigger for civil war in America, and the Confederate Army used the vigènere code in the American Civil War. Babbage and Kasiski successfully broke the vigènere code in the mid- 19th century [11]. This type of encryption algorithm is very well known because it is easy to understand and implement.

The technique to produce ciphertext can be done using number substitution or rectilinear square. The technique of substituting vigènere by using numbers is done by

(6)

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Journal of critical reviews 77 exchanging letters for numbers, almost the same as a sliding

code.

Figure 1. Vigenere Table Figure 1 is an example of a Vigenere table of 26 characters.

The character index starts from the numbers 0 to 25. Each character is represented by that number, depending on the position of the character in the table.

METHODOLOGY

The research design is how research is modeled in a flow or diagram. Many ways can be done to design research to be more directed and structured. This design requires high accuracy so as not to violate the existing rules. It is intended

that the application program that has been created can work efficiently and effectively. The research design is described using an Activity Diagram. Each direction of research is clear and structured. It can facilitate researchers in producing the correct output. Design research that produces the smallest error limit in research is called the best design results. The following figure is the Activity Diagram design to define each stage to complete the work activities of users of the research design to be carried out.

Input Plaintext

Encryption Input Key

Decryption

PT to ASCII

ASCII + Key mod 256

CT To ASCII

ASCII - Key Mod 256

<<extend>>

<<extend>>

<<extend>>

<<extend>>

Figure 2. Activity Diagram of Vigenere Cipher

RESULT AND DISCUSSION

Implementation is the practice of every plan, method, or design, idea, model, specification, standard, or policy to do something. Thus, implementation is an action that must follow any initial thought in order for something to happen.

In the context of information technology, software or hardware implementation includes all post-sale processes involved in something that operates well in its environment, including analyzing requirements, installation, configuration, adjustments, running, testing, system integration, user training, delivery, and manufacturing that is required.

Calculation examinations are designed to estimate the ability of an application program to add, subtract, divide, and

multiply numbers quickly and accurately. In the example that will be presented, plaintext and key will be given to be processed to get the ciphertext. This test is carried out to see how accurate the application program is created and whether it is by calculations performed manually. The process consists of two processes, such as the encryption process and the decryption process. The following calculation is a complete explanation and calculation of the encryption and decryption process in the Vigenere Cipher algorithm by providing two plaintext and keys.

(7)

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Journal of critical reviews 78 Table 1. Encryption Test

Plaintext Key Plaintext

ASCII Key

ASCII Operator Result Ciphertext

H 72 T 84 + 156 œ

E 69 O 79 + 148 ”

L 76 P 80 + 156 œ

L 76 S 83 + 159 Ÿ

O 79 P 80 + 159 Ÿ

32 E 69 + 101 e

W 87 E 69 + 156 œ

O 79 D 68 + 147 “

R 82 T 84 + 166 ¦

L 76 O 79 + 155 ›

D 68 P 80 + 148 ”

Table 1 explains the plaintext will be changed to ciphertext.

The plaintext is "HELLO WORLD," and the key is

"TOPSPEED." Key characters must meet the length of the plaintext so that all characters in the plaintext have key

pairs. The plaintext and key characters will be changed according to the values in the ASCII table. Both will be added and produce ciphertext.

Table 2. Decryption Test Ciphertext Key Ciphertext

ASCII Key ASCII Operator Result Plaintext

œ 156 T 84 - 72 H

” 148 O 79 - 69 E

œ 156 P 80 - 76 L

Ÿ 159 S 83 - 76 L

Ÿ 159 P 80 - 79 O

e 101 E 69 - 32

œ 156 E 69 - 87 W

“ 147 D 68 - 79 O

¦ 166 T 84 - 82 R

› 155 O 79 - 76 L

” 148 P 80 - 68 D

The ciphertext generated in the previous table will be returned so that it produces a plaintext. Table 2 is the result of the decryption process from the ciphertext obtained in table 1. The plaintext results are in the form of "HELLO WORLD." These results did not change so that the Vigenere Cipher calculation did not experience errors and failures.

CONCLUSION

After carrying out research related to the Vigenere CIpher algorithm, the author can draw some conclusions based on the results of tests conducted after conducting research.

Three conclusions can be drawn from the results of the study. Vigenere Cipher works by shifting characters.

Vigenere Cipher has a key that can be determined according to the desired number of keys. Vigenere Cipher must use modulo so that the encrypted character does not exceed the character limit in the ASCII table.

REFERENCES

1. H. Ming and S. LiZhong, “A New System Design of Network Invasion Forensics,” in 2009 Second International Conference on Computer and Electrical Engineering, 2009, pp. 596–599.

2. W. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Prentice Hall Press, 2013.

3. A. A. Bruen and M. A. Forcinito, Cryptography, Information Theory, and Error‐Correction: A Handbook for the 21st Century. New Jersey: John Wiley & Sons, 2005.

4. F. H. Khan, R. Shams, F. Qazi, and D.-E.-S. Agha, “Hill Cipher Key Generation Algorithm by using Orthogonal Matrix,” Int. J.

Innov. Sci. Mod. Eng., vol. 3, no. 3, pp. 5–7, 2015.

5. M. den Hengst and M. Warnier, “Cyber Crime in Privately Held Information Systems: Personal Data at Stake,” in 2013 European Intelligence and Security Informatics Conference, 2013, pp. 117–120.

6. Iswanto, “Avoiding local minima for path planning quadrotor based on modified potential field,” Int. Rev. Aerosp. Eng., vol.

11, no. 4, pp. 146–154, Aug. 2018.

(8)

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Journal of critical reviews 79 7. Iswanto, O. Wahyunggoro, and A. I. Cahyadi, “3D object

modeling using data fusion from laser sensor on quadrotor,”

in AIP Conference Proceedings, 2016, vol. 1755.

8. W. Stallings, “Cryptography and Network Security Principles and Practices,” 4th Editio., .

9. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing

Vulnerabilities and Countermeasures,” Comput. Sci. Manag.

Stud., vol. 11, no. 3, pp. 60–63, 2011.

10. A. Hidayat, “Algoritma Kriptografi Vigenere Cipher,” 2012. . 11. Dony Ariyus, Pengantar Ilmu Kriptografi. Yogyakarta: Andi

Offset, 2008.

Referensi

Dokumen terkait

Geng galau skripsi (Metha, Yudith, Jacqueline, Icha, Wisye) yang telah bersama-sama peneliti mengerjakan skripsi dari pagi hingga malam, mulai dari h-20

Tabel 4.6 Hasil Tanggapan Responden Terhadap Variabel Ekuitas Merek 45 Tabel 4.7 Hasil Tanggapan Responden Terhadap Variabel Sikap Nasabah 46 Tabel 4.8 Hasil Tanggapan

Berdasarkan data-data dan hasil uji penelitian ini dapat diambil kesimpulan bahwa secara parsial Variabel Return On Equity (ROE), Variabel perubahan Arus Kas Operasi

Pada analisis tambahan dengan meng- gunakan teknik anova diperoleh hasil bahwa tidak ada perbedaan yang signifikan antara tipe kepri- badian dengan jenis kelamin,

Secara garis besar Penetapan Kinerja Tahunan Tahun 2019 memiliki 2 (dua) Sasaran Strategis, pengukuran pencapaian sejumlah sasaran tersebut dilakukan melalui 5

Hasil ana lisis sidik ragam menunjukkan bahwa penyimpanan beku berpengaruh sangat nyata (p&lt;0,01) terhadap pertambahan berat badan tikus (Lampiran 27) dan hasil uji

Jumlah Populasi Ternak Besar Menurut Jenis di Kab.. 02

Terlepas dari keunggulan yang dimiliki, kayu sebagai produk alam memiliki beberapa kelemahan diantaranya bersifat biodegradable terhadap rayap, jamur dan organisme perusak