Implementation Of A Combination Of Stream Cipher Algorithm And Rotate 13 For Data Security

Authors

  • Ikhsan Tri Mukrozi Universitas Dehasen Bengkulu
  • Sapri Sapri Universitas Dehasen Bengkulu
  • Abdussalam Al Akbar Universitas Dehasen Bengkulu

DOI:

https://doi.org/10.53697/jkomitek.v4i1.1727

Keywords:

Security, Stream Cipher, ROT13

Abstract

The issue of data security and confidentiality is one of the important aspects of data, messages and information. Stream Cipher is often referred to as a stream cipher. The advantage of this method is that it is relatively faster in the encryption-decryption process and is also not limited by the length of the plaintext. ROT13 is a substitution cipher encryption by shifting characters forward 13 times, counting 1 character in front of it, and shifting characters based on the order of characters in the ASCII table. By combining the Stream Cipher and ROT13 algorithms, it produces a method that can provide a better level of security compared to the application of each of these methods separately. The results of the analysis and testing carried out using different decryption keys resulted in the ciphertext cannot be returned which shows normal things because the method used is symmetrical cryptography so that the decryption process can only be done using the same key as the key during decryption.

References

Alfina, O., & Harahap, F. (2019). Pemodelan Uml Sistempendukung Keputusan Dalam Penentuan Kelas Siswa Siswa Tunagrahita. METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi, 143-150.

Dewi, E. (2018). Implementasi Kebijakan Tentang Pengelolaan Perpustakaan Oleh Pegawai Perpustakaan Dalam Upaya Meningkatkan Minat Baca Masyarakat (Studi Analisis di Kecamatan Cijulang Kabupaten Pangandaran). Jurnal MODERAT, 60-68.

Ding, L., Liu, C., Zhang, Y., & Ding, Q. (2019). A new lightweight stream cipher based on chaos. Symmetry. https://www.mdpi.com/2073-8994/11/7/853

Ekta , N., Christian, A., & Wijaya, K. (2021). Implementasi Metode (User Centered Design) PadaRancang Bangun Sistem Informasi Perpustakaan : Studi Kasus : SMK Negeri 1 Gelumbang. Jurnal Pengembangan Sistem Informasi dan Informatika, 69-77.

Gunawan, & Kirman. (2019). Implementasi Algoritma Turbo Boyer Moore Untuk Pencarian Data Pada Transaksi Keuangan Duta Phonecell Sawah Lebar. Jurnal Media Infotama, 9-15.

Hidayatuloh, K., Yustantina, & Kusmadi. (2021). Perbandingan Metode Stream Cipher Dan Hill Cipher Dalam Keamanan Data. Jurnal Infotronik , 27-31.

Hidayatuloh, K., Yustantina, & Kusmadi. (2021). Perbandingan Metode Stream Cipher Dan Hill Cipher Dalam Keamanan Data. Jurnal Infotronik, 27-31.

Jiao, L., Hao, Y., & Feng, D. (2020). Stream cipher designs: a review. Science China Information Sciences. https://doi.org/10.1007/s11432-018-9929-x

Kurniawan, D., Mayasari, N., & Fitriani, W. (2023). Perbandingan Algoritma Cipher Dengan Algoritma ROT13 pada proses pengamanan data. Jurnal darma agung, 534-541.

Milian, Y. C., & Sulistyo, W. (2023). Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher. Jurnal JTIK. https://www.journal.lembagakita.org/jtik/article/view/716

Mubarak, A. (2019). Rancang Bangun Aplikasi Web Sekolah Menggunakan UML (Unified Modeling Language) Dan Bahasa Pemrograman PHP (Hypertext Preprocessor) Berorientasi Objek. JIKO (Jurnal Informatika dan Komputer), 19-25.

Munandar, A., Rosnelly, R., & Sianturi, C. J. (2020). Rancang Bangun Aplikasi Keamanan Data Teks Menggunakan Algoritma Stream Cipher. Jurnal FTIK (Fakultas Teknik dan Informatika Komputer), 407-416.

Noura, H., Salman, O., Couturier, R., & Chehab, A. (2023). Lesca: Lightweight stream cipher algorithm for emerging systems. Ad Hoc Networks. https://www.sciencedirect.com/science/article/pii/S1570870522001718

Pardede, A., Manurung, H., & Filina, D. (2017). Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen. Jurnal Teknik Informatika Kaputama (JTIK), 26-33.

Pramudya, E., Hatmi, M., Susanto, A., Mulyono, I., & Muslih. (2020). Kombinasi Algoritma Rot13 Dan Vigenere Cipher Pada Alamat Directory File Untuk Keamanan Dokumen. Seminar Nasional (SEMNAS) LPPM UNiversitas Muhammadiyah Purwokerto, 548-555.

Pudi, V., Chattopadhyay, A., & ... (2017). Secure and lightweight compressive sensing using stream cipher. IEEE. https://ieeexplore.ieee.org/abstract/document/7948801/

Ridho, A., Mutia, C., & Sinaga, A. P. (2022). Analisis Enkripsi dan Dekripsi Cipher Teks Menggunakan Kombinasi Gronsfeld Cipher Dengan Reverse Cipher. Jurnal Teknik Informatika Kaputama (JTIK), 6(1).

Risman, R. (2021). Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at PT Samudera Indonesia. International Journal of Basic and Applied Science. https://ijobas.pelnus.ac.id/index.php/ijobas/article/view/61

Sari, D. P., & Saragih, N. E. (2023). Implementasi Algoritma Vigenere Cipher Dan Rot13 Untuk Keamanan Pesan Pada Aplikasi Chatting. Journal of Informatics and Computers, 1-8.

Sikumbang, A., Haryanto, E., & Saleh, A. (2020). Kombinasi Metode Stream Cipher Dan Caesar Cipher Dalam Pengamanan Data Kredit Customer. Jurnal FTIK, 693-703.

Silalah, L., & Sindar, A. (2020). Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1. Jurnal Nasional Komputasi dan Teknologi Informasi, 182-186.

Suendri. (2018). Implementasi Diagram UML (Unified Modelling Language) Pada Perancangan Sistem Informasi Remunerasi Dosen Dengan Database Oracle (Studi Kasus: UIN Sumatera Utara Medan). ALGORITMA: Jurnal Ilmu Komputer dan Informatika, 1-9.

Ummah, H., Sodikin, I., & Susetyo, J. (2019). Perancangan Sistem Informasi Rental & Inventaris Alat Multimedia Berbasis Web Menggunakan Metode Customer Relationship ManagemenT. JURNAL REKAVASI (Rekayasa dan Inovasi Teknik Industri), 15-24

Wahyuni, R., & Irawan, Y. (2020). Aplikasi E-Book Untukaturan Kerja Berbasis Web Di

Downloads

Published

2024-07-09

How to Cite

Mukrozi, I. T., Sapri, S., & Akbar , A. A. (2024). Implementation Of A Combination Of Stream Cipher Algorithm And Rotate 13 For Data Security. Jurnal Komputer, Informasi Dan Teknologi, 4(1), 10. https://doi.org/10.53697/jkomitek.v4i1.1727

Issue

Section

Articles

Most read articles by the same author(s)

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.