MODIFIKASI HILL CIPHER DENGAN MENGGUNAKAN MATRIKS KUNCI ORTHOGONAL DAN TRANSPOSITION SUBSTITUTION LEFT RIGHT SHIFT (TSLRS)

Yuniardi Wahyu Nugraha, Thresye Thresye, Oni Soesanto

Abstract


Matrix is a collection of components arranged in rows and columns, concept of a matrix can be used in solving a problem related to cryptography. A mathematician named Lester Hill created a polyalphabetic cryptographic system called the Hill Cipher. Hill cipher is an algorithm that in its process uses a matrix with size (a × a) as the key matrix. The classic Hill Cipher has the disadvantage that the operation used is not complicated. In this study, the classic Hill Cipher will be modified by using an orthogonal matrix as the key matrix, as well as adding several other operations such as transposition, substitution, and bit shift. This study compares the performance of the traditional Hill Cipher and the modified Hill Cipher in terms of cryptographic techniques on data(text). This research was conducted by encrypting and decrypting the classic Hill Cipher and modified Hill Cipher using similar data (text). Furthermore, a simulation will be carried out using Matlab so that it can use data (text) with a larger size. The results obtained are Hill Cipher which has been modified using an asymmetric cryptographic system, that is in left-right shift process so that the matrix keys will be different when use for encryption and decryption. Because it uses a different key in the encryption and decryption process, thus increasing the level of difficulty in decoding the message.


Full Text:

PDF

References


Arif, M. H., & Fanani, A. Z. (2016). Kriptografi Hill Cipher Dan Least Significant Bit Untuk Keamanan Pesan Pada Citra. CSRID (Computer Science Research and Its Development Journal), 8(1), 60. https://doi.org/10.22303/csrid.8.1.2016.60-72

Basri. (2016). Kriptografi Simetris dan Asimetris dalam Perspektif Keamanan Data dan Kompleksitas Komputasi. Jurnal Ilmiah Ilmu Komputer, 2(2).

Fitriawan, D. (2020). Pengembangan Bahan Ajar Aljabar Linear Elementer Berdasarkan Kemampuan Koneksi Matematis. Jurnal Pendidikan Matematika Dan IPA, 11(2), 217. https://doi.org/10.26418/jpmipa.v11i2.37476

Frobenius, A. C., & Hidayat, E. R. (2019). Steganografi LSB dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher dan Playfair pada Image. TEKNOMATIKA, 11(2), 105–118.

Hagusian, A. H. (2014). Implementasi Algoritma Kriptografi Hill Cipher Dalam Penyandian Data Gambar. Pelita Informatika Budi Darma, 7(2), 76–81.

Hanif Khan, F., Shams, R., & Qazi, F. (2015). Hill Cipher Key Generation Algorithm by using Orthogonal Matrix.

Irawan, M. D. (2017). Implementasi Kriptografi Vigenere Cipher Dengan Php. Jurnal Teknologi Informasi, 1(1), 11. https://doi.org/10.36294/jurti.v1i1.21

Ismail, I. A., Amin, M., & Diab, H. (2006). How to repair the Hill cipher. Journal of Zhejiang University: Science, 7(12), 2022–2030. https://doi.org/10.1631/jzus.2006.A2022

Kamaci, H., Saltik, K., Fulya Akiz, H., & Osman Atagün, A. (2018). Cardinality inverse soft matrix theory and its applications in multicriteria group decision making. Journal of Intelligent and Fuzzy

Systems, 34(3), 2031–2049. https://doi.org/10.3233/JIFS-17876

Khan, F. H., & Qazi, F. (2015). Advance Procedure Of Encryption And Decryption Using Transposition And Substitution. Journal of Computer Science of Newports Institute of Communications and Economics, 6(2015), 39–51.

Munir, R. (2016). Matematika Diskrit (6th ed.). Informatika Bandung.

Puspita, khairani, & Wayahdi, M. R. (2015). Analisis Kombinasi Metode Caesar Cipher , Vernam Cipher , Dan Hill Cipher Dalam Proses Kriptografi. Seminar Nasional Teknologi Informasi Dan Multimedia 2015, Februari, 43–48.

Qazi, F., Khan, F. H., Agha, D., Khan, S. A., & Rehman, S. ur. (2019). Modification in Hill Cipher for Cryptographic Application. 3C Tecnología_Glosas de Innovación Aplicadas a La Pyme, May, 240–257. https://doi.org/10.17993/3ctecno.2019.specialissue2.240-257

V

aranasi, A., Sastry, V. U. K., & Kumar, S. U. (2011). Journal of Global Research in Computer Science Available Online at www.jgrcs.info Information Retrieval using Web. 2(4), 65–68.

Wardhani, R., Nurshiami, S. R., & Larasati, N. (2022). Komputasi Enkripsi Dan Dekripsi Menggunakan Algoritma Hill Cipher. Jurnal Ilmiah Matematika Dan Pendidikan Matematika, 14(1), 45. https://doi.org/10.20884/1.jmp.2022.14.1.5727




DOI: https://doi.org/10.20527/epsilon.v17i1.9232

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN

Indexed by:

          

 

EDITORIAL OFFICE 

           

 

 

 

Creative Commons License
JMMTE is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.