PENERAPAN ALGORITMA HILL CIPHER DAN PERMUTASI PADA SISTEM KRIPTOGRAFI POLYALPHABETIC

Sindi Lukmaini, Yanuar Bhakti Wira Tama, Kartika Nugraheni

Abstract


T

Technological advances have a great influence on facilitating long-distance communication, one of which is exchanging messages. The security of a message is an important aspect of protecting sensitive information. Cryptography is a branch of science that aims to maintain the confidentiality, integrity, and authenticity of messages in communication. One of the cryptographic methods used is Hill Cipher, which converts plaintext into ciphertext using a key matrix, but Hill Cipher is vulnerable to cryptanalysis attacks, especially if the key matrix is not chosen properly. Based on these problems, this research was conducted by applying the Hill Cipher algorithm with permutation as an additional layer of security. This study aims to analyze the effect of the message and key matrix on the performance of computation time in the encryption and decryption process of Hill Cipher combined with permutation, where the message characters are limited to 26 alphabetic characters and the use of Hill block length and permutation techniques is set at 5 characters. The simulation results show the average performance of computation time on the encryption and decryption process is 0.000083199 seconds and 0.000113493 seconds for a message with 707 characters. The key matrix used must be invertible, and the performance of computation time on encryption and decryption with different keys is 0.000094817 seconds and 0.00025938 seconds.


Keywords


Computation, Cryptography, Hill Cipher, Permutation, Polyalphabetic Cipher

Full Text:

PDF

References


Courtois, N. T., & Grajek, M. (2022). On latin squares, invariant differentials, random permutations and historical Enigma rotors. Cryptologia, 46(5), 387–421. https://doi.org/10.1080/01611194.2021.1920070

Forouzan, B. A. (2020). INTRODUCTION TO CRYPTOGRAPHY AND NETWORK SECURITY (1st ed.). McGraw-Hill.

Gunawan, I. (2018). Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 2(2), 124–129. https://doi.org/10.30743/infotekjar.v2i2.266

Hewage, C., Jayal, A., Jenkins, G., & Brown, R. J. (2022). A Learned Polyalphabetic Decryption Cipher. SNE Simulation Notes Europe, 28(4), 141–148.

John, M. N., Ozioma, O., Otobong. G., U., Nwala, B. O., & Ngozi, O. P. (2023). CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER. GPH - INTERNATIONAL JOURNAL OF MATHEMATICS, 6(11), 1–6.

Jolfaei, A., Wu, X.-W., & Muthukkumarasamy, V. (2016). On the Security of Permutation-Only Image Encryption Schemes. IEEE Transactions on Information Forensics and Security, 11(2), 235–246. https://doi.org/10.1109/TIFS.2015.2489178

Lakhera, M., Rauthan, M. M. S., & Agarwal, A. (2016). Securing biometric template using double hill cipher with self-invertible key and random permutation of pixels locations. 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 814–817. https://doi.org/10.1109/NGCT.2016.7877522

Mohan, M., Kavithadevi, M. K., & Jeevan Prakash, V. (2016). Improved Classical Cipher for Healthcare Applications. Procedia Computer Science, 93, 742–750. https://doi.org/10.1016/j.procs.2016.07.285

Paragas, J. R., Sison, A. M., & Medina, R. P. (2019). Hill Cipher Modification: A Simplified Approach. 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), 821–825. https://doi.org/10.1109/ICCSN.2019.8905360

Ramadani, S. (2020). HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA. METHOMIKA Jurnal Manajemen Informatika Dan Komputerisasi Akuntansi, 4(1), 1–9. https://doi.org/10.46880/jmika.Vol4No1.pp1-9

Santoso, Y. S. (2021). Message Security Using a Combination of Hill Cipher and RSA Algorithms. Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA), 1(1), 20–28. https://doi.org/10.54076/jumpa.v1i1.38

Stinson, D. R., & Paterson, M. B. (2018). Cryptography. Chapman and Hall/CRC. https://doi.org/10.1201/9781315282497

Tama, Y. B. W., & Fahmi, M. F. (2023). Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery. Euler : Jurnal Ilmiah Matematika, Sains Dan Teknologi, 11(2), 361–371. https://doi.org/10.37905/euler.v11i2.23009

Vishwa Nageshwar, K., & Ravi Shankar, N. (2021). Cryptanalysis of Modification in Hill Cipher for Cryptographic Application (pp. 659–666). https://doi.org/10.1007/978-981-15-5243-4_62




DOI: https://doi.org/10.20527/epsilon.v18i2.12845

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN

Indexed by:

          

 

EDITORIAL OFFICE 

           

 

 

 

Creative Commons License
JMMTE is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.