PENERAPAN ALGORITMA HILL CIPHER DAN PERMUTASI PADA SISTEM KRIPTOGRAFI POLYALPHABETIC
Abstract
Technological advances have a great influence on facilitating long-distance communication, one of which is exchanging messages. The security of a message is an important aspect of protecting sensitive information. Cryptography is a branch of science that aims to maintain the confidentiality, integrity, and authenticity of messages in communication. One of the cryptographic methods used is Hill Cipher, which converts plaintext into ciphertext using a key matrix, but Hill Cipher is vulnerable to cryptanalysis attacks, especially if the key matrix is not chosen properly. Based on these problems, this research was conducted by applying the Hill Cipher algorithm with permutation as an additional layer of security. This study aims to analyze the effect of the message and key matrix on the performance of computation time in the encryption and decryption process of Hill Cipher combined with permutation, where the message characters are limited to 26 alphabetic characters and the use of Hill block length and permutation techniques is set at 5 characters. The simulation results show the average performance of computation time on the encryption and decryption process is 0.000083199 seconds and 0.000113493 seconds for a message with 707 characters. The key matrix used must be invertible, and the performance of computation time on encryption and decryption with different keys is 0.000094817 seconds and 0.00025938 seconds.
Keywords
Full Text:
PDFReferences
Courtois, N. T., & Grajek, M. (2022). On latin squares, invariant differentials, random permutations and historical Enigma rotors. Cryptologia, 46(5), 387–421. https://doi.org/10.1080/01611194.2021.1920070
Forouzan, B. A. (2020). INTRODUCTION TO CRYPTOGRAPHY AND NETWORK SECURITY (1st ed.). McGraw-Hill.
Gunawan, I. (2018). Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 2(2), 124–129. https://doi.org/10.30743/infotekjar.v2i2.266
Hewage, C., Jayal, A., Jenkins, G., & Brown, R. J. (2022). A Learned Polyalphabetic Decryption Cipher. SNE Simulation Notes Europe, 28(4), 141–148.
John, M. N., Ozioma, O., Otobong. G., U., Nwala, B. O., & Ngozi, O. P. (2023). CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER. GPH - INTERNATIONAL JOURNAL OF MATHEMATICS, 6(11), 1–6.
Jolfaei, A., Wu, X.-W., & Muthukkumarasamy, V. (2016). On the Security of Permutation-Only Image Encryption Schemes. IEEE Transactions on Information Forensics and Security, 11(2), 235–246. https://doi.org/10.1109/TIFS.2015.2489178
Lakhera, M., Rauthan, M. M. S., & Agarwal, A. (2016). Securing biometric template using double hill cipher with self-invertible key and random permutation of pixels locations. 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 814–817. https://doi.org/10.1109/NGCT.2016.7877522
Mohan, M., Kavithadevi, M. K., & Jeevan Prakash, V. (2016). Improved Classical Cipher for Healthcare Applications. Procedia Computer Science, 93, 742–750. https://doi.org/10.1016/j.procs.2016.07.285
Paragas, J. R., Sison, A. M., & Medina, R. P. (2019). Hill Cipher Modification: A Simplified Approach. 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), 821–825. https://doi.org/10.1109/ICCSN.2019.8905360
Ramadani, S. (2020). HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA. METHOMIKA Jurnal Manajemen Informatika Dan Komputerisasi Akuntansi, 4(1), 1–9. https://doi.org/10.46880/jmika.Vol4No1.pp1-9
Santoso, Y. S. (2021). Message Security Using a Combination of Hill Cipher and RSA Algorithms. Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA), 1(1), 20–28. https://doi.org/10.54076/jumpa.v1i1.38
Stinson, D. R., & Paterson, M. B. (2018). Cryptography. Chapman and Hall/CRC. https://doi.org/10.1201/9781315282497
Tama, Y. B. W., & Fahmi, M. F. (2023). Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery. Euler : Jurnal Ilmiah Matematika, Sains Dan Teknologi, 11(2), 361–371. https://doi.org/10.37905/euler.v11i2.23009
Vishwa Nageshwar, K., & Ravi Shankar, N. (2021). Cryptanalysis of Modification in Hill Cipher for Cryptographic Application (pp. 659–666). https://doi.org/10.1007/978-981-15-5243-4_62
DOI: https://doi.org/10.20527/epsilon.v18i2.12845
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN
Indexed by:
EDITORIAL OFFICE
JMMTE is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.