2018
DOI: 10.14419/ijet.v7i2.3.12624
|View full text |Cite
|
Sign up to set email alerts
|

Combination Vigenere Cipher and One Time Pad for Data Security

Abstract: Data security can be done with many techniques such as steganography and cryptography, the use of cryptographic algorithms such as Vigenere Cipher and One Time Pad to secure the data is expected to make the data difficult to be known by irresponsible parties, the test obtained results that the ciphertext results of different combinations and strong enough because the key used must match the length of the plaintext.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 14 publications
(16 reference statements)
0
9
0
2
Order By: Relevance
“…salah satu metode yang dapat digunakan kriptanalisis adalah dengan menggunakan metode Kasiski. Metode kasiski akan melakukan penebakan panjang kunci melalui serangkaian perhitungan pola huruf n-graf [2][3][4] [5]. Oleh karena itu dalam peneltian untuk menggabungkan beberapa algoritma untuk dimodifikasi yaitu vignere dan one time pad untuk proses enkripsi dan penambahan algoritma perpanjangan kunci dari rc6 untuk menghilangan perulangan kunci yang terjadi sehingga keamanan data menjadi lebih baik.…”
Section: Latar Belakang Masalahunclassified
“…salah satu metode yang dapat digunakan kriptanalisis adalah dengan menggunakan metode Kasiski. Metode kasiski akan melakukan penebakan panjang kunci melalui serangkaian perhitungan pola huruf n-graf [2][3][4] [5]. Oleh karena itu dalam peneltian untuk menggabungkan beberapa algoritma untuk dimodifikasi yaitu vignere dan one time pad untuk proses enkripsi dan penambahan algoritma perpanjangan kunci dari rc6 untuk menghilangan perulangan kunci yang terjadi sehingga keamanan data menjadi lebih baik.…”
Section: Latar Belakang Masalahunclassified
“…The AES algorithm in the decrypt text messages that have been compressed to obtain the plaintext that will be inserted into the image file. For example the decryption is done by Ciphertext: CIPHER KEY = 2B 7E 15 16…”
Section: Decryption Ciphertextmentioning
confidence: 99%
“…In mathematics, prime numbers are natural numbers that only have two factors, namely the divisor is 1 and the number itself [1]. The uniqueness of prime numbers is widely used in cryptographic algorithms especially on key generation [2][3][4], the strength of a cryptography algorithm depends on the key used [5][6][7] and prime number is one of the factors that determine the strength of security [8][9][10]. Few algorithms using a prime number for the key is RSA, RC4 and Blowfish algorithm using the prime number in p and q key for encryption and decryption process [11][12][13][14], this prime numbers become essential not only in mathematics but also in computer science.…”
Section: Introductionmentioning
confidence: 99%