Hybrid Cryptosystem Analysis by Using The Combination of Vigenere Cipher and RSA for Text Security

Jamaludin Jamaludin, Romindo Romindo

Abstract


The development of Information and Communication Technology (ICT) brought many benefits to the needs of human life, especially the needs for the information which is increasingly obtained easily. This is in line with the need for information security from parties who want to get important data so that it can harm the owner of the source data. One of the data safeguards used is cryptography. Once the importance of data security, almost all activities of human life cannot be separated from cryptography.  According to the key used, cryptography can be divided into two, namely: symmetric cryptography and asymmetric cryptography, which has its own advantages and disadvantages. The objective of this research is to analyze through the calculation results so that they can be applied to overcome the weaknesses that occur from the two types of cryptography. The hybrid cryptosystem coding method is always used to overcome the weaknesses of the two cryptographs. The coding process in this research uses two cryptographic algorithms. They are the Vigenere Cipher algorithm as an example of a symmetrical algorithm and the RSA (Rivest Shamir Adleman) algorithm, which is an example of an asymmetric algorithm. The result of the research on the calculation shows that there is increased security in the encryption because there will be two encodings, namely the coding of the messages by the Vigenere Cipher cryptographic algorithm and key coding by the RSA cryptographic algorithm


Keywords


Cryptography, Hybrid Cryptosystem, Vegenere Cipher, RSA

Full Text:

PDF

References


Ariyus, D. (2008) Pengantar ilmu kriptografi: teori analisis & implementasi. Yogyakarta: ANDI. Retrieved at: https://books.google.co.id/books?id=3SSTJONEmX0C&printsec=frontcover&hl=id#v=onepage&q&f=false.

Gunawan, I. (2018) “Kombinasi algoritma Caesar cipher dan algoritma RSA untuk pengamanan file dokumen dan pesan teks,” Infotekjar, 2(1), pp. 124–129.

Gupta, R. K. dan Singh, P. (2013) "A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network," 3(8), pp. 108–115.

Jamaludin (2019) “Rancang Bangun Kombinasi Hill Cipher dan RSA Menggunakan Metode Hybrid Cryptosystem,” Sinkron, 2(April 2018). Retrieved at: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/139.

Rakhman, A. A. dan Kurniawan, A. W. (2015) “Implementasi Algoritma Kriptografi Rivest Shamir Adleman ( Rsa ) Dan Vigenere Cipher Pada Gambar Bitmap 8 Bit,” Techno.COM, 14(2), pp. 122–134, ISSN:2356-2579. Retrieved at: http://publikasi.dinus.ac.id/index.php/technoc/article/view/886/657.

Rifki Sadikin (2012) Kriptografi untuk keamanan jaringan. Yogyakarta: Penerbit ANDI.

Rinaldi, M. (2006) Kriptografi. Bandung: Informatika. Retrieved at: https://scholar.google.com/scholar?hl=th&as_sdt=0,5&cluster=16551445928354209324.

Romindo, R. (2018) “Analisa Perbandingan Algoritma Monoalphabetic Cipher Dengan Algoritma One Time Pad Sebagai Pengamanan Pesan Teks,” Sinkron, 2(April 2018). Retrieved at: http://jurnal.polgan.ac.id/index.php/sinkron/article/view/123..




DOI: https://doi.org/10.31098/ic-smart.v1i1.31

Article Metrics

Abstract view : 218 times
PDF - 51 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Jamaludin Jamaludin, Romindo Romindo

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

PUBLISHED BY:

IKATAN DOSEN REPUBLIK INDONESIA, RSF PRESS & RESEARCH SYNERGY FOUNDATION

Proceeding on International Conference of Science Management Art Research Technology (IC-SMART). 

Mailing Address: 
Research Synergy Foundation
Jalan Nyaman no 31 
Komplek Sinergi Antapani 
Bandung 40291 - Indonesia. 

Email:info@icsmartconference.com

 
The Proceeding on on International Conference of Science Management Art Research Technology (IC-SMART) is indexed by:
 
  
 
 
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.