Penerapan Teknik Super Enkripsi Untuk Keamanan File Teks Menggunakan Gabungan Algoritma Beaufort Cipher dan Algoritma RSA

Yusuf Ramadhan Nasution(1*), Abdul Halim Hasugian(2), M Mahyudi(3),

(1) Universitas Islam Negeri Sumatera Utara, Indonesia
(2) Universitas Islam Negeri Sumatera Utara, Indonesia
(3) Universitas Islam Negeri Sumatera Utara, Indonesia
(*) Corresponding Author

Abstract


Cryptography is an alternative solution that can be applied to protect and increase data security. This research will implement a combination of the Beaufort Cipher symmetric cryptographic algorithm and the RSA asymmetric cryptographic algorithm in a super encryption scheme to increase data security in text files. The combination of the two cryptographic algorithms is done by first encrypting the message contained in the text file using the Beaufort Cipher algorithm key, then re-encrypting it with the public key of the RSA algorithm to create an encrypted text file. The combination method between the two algorithms aims to obtain superior encryption (ciphertext) results so that they are not easy to crack, and also to handle the use of a single ciphertext which is comparatively weak because it only uses one cryptographic algorithm. This research produces a web-based application that can be used to secure text files using a combination of the Beaufort Cipher algorithm and the RSA algorithm in the super encryption technique.

Full Text:

PDF

References


Soediro, “Prinsip Keamanan, Privasi, dan Etika dalam Undang-undang Informasi dan Transaksi Elektronik dalam Perspektif Hukum Islam,” Kosmik Huk., vol. 18, no. 2, pp. 95–112, 2018.

N. F. Ginting and M. Ginting, “Perbandingan Kriptografi RSA dengan Base64,” J. Tek. Inform. Unika St. Thomas, vol. 2, no. 2, pp. 47–52, 2017, doi: https://doi.org/10.17605/jti.v2i2.190.

M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 2, no. 1, pp. 12–22, 2018, doi: 10.30645/j-sakti.v2i1.52.

B. S. Muchlis, M. A. Budiman, and D. Rachmawati, “Teknik Pemecahan Kunci Algoritma Rivest Shamir Adleman (RSA) dengan Metode Kraitchik,” J. Penelit. Tek. Inform., vol. 2, no. 2, pp. 49–64, 2017, [Online]. Available: http://jurnal.polgan.ac.id/index.php/sinkron/article/view/75

S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, and S. Srinjiwi, “Analisis Performa Kriptografi Hybrid Algoritma Blowfish Dan Algoritma RSA,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 6, no. 1, pp. 1–10, 2019, doi: 10.33330/jurteksi.v6i1.395.

R. Kurniawan, “Rancang Bangun Aplikasi Pengaman Isi File Dokumen Dengan Algoritma RSA,” J. Ilmu Komput. dan Inform., vol. 1, no. 1, pp. 46–52, 2017, doi: http://dx.doi.org/10.30829/algoritma.v1i01.1309.

M. Fadlan, S. Sinawati, A. Indriani, and E. D. Bintari, “Pengamanan Data Teks Melalui Perpaduan Algoritma Beaufort Dan Caesar Cipher,” J. Tek. Inform., vol. 12, no. 2, pp. 149–158, 2019, doi: 10.15408/jti.v12i2.12262.

C. Irawan, E. Hari Rachmawanto, C. Atika Sari, and C. Agus Sugianto, “Super Enkripsi File Dokumen Menggunakan Beaufort Cipher Dan Transposisi Kolom,” in Seminar Nasional LPPM, 2020, pp. 556–563.

R. A. Megantara and F. A. Rafrastara, “Super Enkripsi Teks Kriptografi menggunakan Algoritma Hill Cipher dan Transposisi Kolom,” Pros. SENDI_U 2019, pp. 85–92, 2019.

H. H. Naing and Z. M. Aye, “Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table,” in WCSE 2020: 2020 10th International Workshop on Computer Science and Engineering, 2020, pp. 55–56. doi: 10.18178/wcse.2020.02.009.




DOI: https://doi.org/10.30645/kesatria.v4i4.238

DOI (PDF): https://doi.org/10.30645/kesatria.v4i4.238.g236

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: