Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security

J Jamaludin(1*), R Romindo(2),

(1) Politeknik Ganesha Medan
(2) Politeknik Ganesha Medan
(*) Corresponding Author

Abstract


According to the key used, cryptography can be divided into two, namely: symmetric cryptography and asymmetric cryptography, each of which has advantages and disadvantages. The selection of asymmetric cryptographic algorithm can perform the encryption process in a short time, but the key security is less secure, so it must be changed frequently. While asymmetric cryptography is the opposite, the security of key distribution can be overcome, but the data encryption process is slower. The coding process in this study uses two cryptographic algorithms, namely the Vigenere Cipher algorithm as an example of the symmetric algorithm and the RSA (Rivest Shamir Adleman) algorithm which is an example of an asymmetric algorithm. The purpose of this research is to calculate and implement so that it can be applied to overcome the weaknesses that occur from the two types of cryptography. The hybrid cryptosystem coding method is always used to overcome the weaknesses of the two cryptographs. The results show that there is an increase in security in encryption because there will be two encodings, namely message encoding with the Vigenere Cipher cryptographic algorithm and key coding with the RSA cryptographic algorithm. Besides, there is an increase in the time in the encryption and decryption process. From the results of the research, it takes 424 milliseconds in the encryption process and 335 milliseconds for the decryption process with 59,400 characters. A hybrid cryptosystem coding method using a combination of Vigenere Cipher and RSA can be implemented to increase text security and increase speed in the encryption process.


Full Text:

PDF

References


D. Rachmawati, A. Sharif, Jaysilen, dan M. A. Budiman, “Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm,” IOP Conf. Ser. Mater. Sci. Eng., vol. 300, no. 1, 2018.

R. Romindo dan J. Jamaludin, “Sistem Pendukung Keputusan Menggunakan Metode ANP Untuk Pemilihan Toko Daring Terbaik di Politeknik Ganesha,” REMIK (Riset dan E-Jurnal Manaj. Inform. Komputer), vol. 4, no. 1, hal. 83, 2019.

M. Rinaldi, Kriptografi. Bandung: Informatika, 2006.

R. K. Gupta dan P. Singh, “A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network,” vol. 3, no. 8, hal. 108–115, 2013.

Jamaludin, “Rancang Bangun Kombinasi Chaisar Cipher dan Vigenere Cipher Dalam Pengembangan Algoritma Kriptografi Klasik,” Semin. Nas. Teknol. Inf., no. The Future of Computer Vision, hal. 234–243, 2017.

D. Ariyus, Pengantar ilmu kriptografi: teori analisis & implementasi. Yogyakarta: Penerbit ANDI, 2008.

Rifki Sadikin, Kriptografi untuk keamanan jaringan. Yogyakarta: Penerbit ANDI, 2012.

L. B. Rivera, J. A. Bay, E. R. Arboleda, M. R. Pereña, dan R. M. Dellosa, “Hybrid Cryptosystem Using RSA , DSA , Elgamal , And AES,” vol. 8, no. 10, hal. 1777–1781, 2019.

A. A. Rakhman dan A. W. Kurniawan, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman ( Rsa ) Dan Vigenere Cipher Pada Gambar Bitmap 8 Bit,” Techno.COM, vol. 14, no. 2, hal. 122–134, ISSN:2356-2579, 2015.

J. Herdyka, “Peranan Pemerintan dan Ikatan Profesi dalam Keselamatan Kerja,” Universitas Gunadarma, 2018.




DOI: https://doi.org/10.30645/ijistech.v4i1.85

Refbacks

  • There are currently no refbacks.







Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: