Text Data Security Using Stream Cipher Algorithm

S Supiyanto(1*), Agung Dwi Saputro(2), Muhammad Asghar(3),

(1) Universitas Cenderawasih, Indonesia
(2) Universitas Cenderawasih, Indonesia
(3) Universitas Cenderawasih, Indonesia
(*) Corresponding Author


The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.

Full Text:



Supiyanto and T. Suparwati, “Penerapan Matriks Invers Tergeneralisasi (MIT) Untuk Keamanan Data Pada Sandi Hill,” Indonesia, 2020.

N. Rajender Reddy, C. Aravind Kumar, P. Rajkumar, and V. Velde, “Public key authentication schemes in asymmetric cryptography,” Mater. Today Proc., no. xxxx, pp. 1–5, 2021, doi: 10.1016/j.matpr.2021.02.172.

R. Munir, “Kriptografi,” Inform. Bandung, 2006.

M. Jumeidi, D. Triyanto, and Y. Brianorman, “Implementasi Algoritma Kriptografi Vernam Cipher Berbasis Fpga,” Coding J. Komput. dan Apl., vol. 4, no. 1, 2016, doi: http://dx.doi.org/10.26418/coding.v4i1.13329.

Y. Irnanda, “Enkripsi dan Dekripsi Dengan Menggunakan Metode Kriptografi Vernam Cipher (XOR),” Kumpul. Karya Ilm. Mhs. Fak. sains dan Tekhnologi, vol. 1, no. 1, p. 47, 2019.

DOI: https://doi.org/10.30645/ijistech.v6i5.278


  • There are currently no refbacks.

Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: