Main Article Content
Cryptography is the study of hiding text and numbers in the form of codes. Vertical Bit Rotation (VBR) is one of the most widely implemented cryptographic algorithms as a one-way hash function that simplifies the encryption process with a high degree of difficulty in decryption. The purpose of this study is to apply VBR hash algorithm modeling to binary value characters with bit rotation keys 10, 11, 7, 3, 2, 7, 5, and 4. Thus, generating a passcode. The results of the encryption simulation show the code in the form of letters and characters, then the result of the decryption with the opposite rotation to the encryption process returns the value from ciphertext to plaintext based on ASCII characters. Cryptographic algorithms are applied to avoid cryptanalytic experiments in opening encryption codes.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
D. A. A. Pertiwi, T. Mustaqim, and M. A. Muslim, “Prediksi Rating Aplikasi Playstore Menggunakan Xgboost,” Proceedings of Seminar Nasional Ilmu Komputer, Semarang: September 2020, pp. 108–112.
D. P. Timothy and A. K. Santra, “A hybrid cryptography algorithm for cloud computing security,” 2017 Int. Conf. Microelectron. Devices, Circuits Syst. ICMDCS 2017, vol. 2017-Janua, pp. 1–5, 2017, doi: 10.1109/ICMDCS.2017.8211728.
C. Wang, S., Wang, C., & Xu, “An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm,” Opt. Lasers Eng., vol. 128, no. 105995, 2020.
S. Agarwal, “Symmetric Key Encryption using Iterated Fractal Functions,” Int. J. Comput. Netw. Inf. Secur., vol. 9, no. 4, pp. 1–9, 2017, doi: 10.5815/ijcnis.2017.04.01.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, 2017, doi: 10.14569/ijacsa.2017.080659.
P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” Procedia Comput. Sci., vol. 125, no. 2009, pp. 691–697, 2018, doi: 10.1016/j.procs.2017.12.089.
D. N. Tutueva, A. V., Karimov, A. I., Moysis, L., Volos, C., & Butusov, “Construction of one-way hash functions with increased key space using adaptive chaotic maps,” Chaos, Solitons & Fractals, vol. 141, 11034, no. 110344, 2020.
D. Pradhan, S. Som, and A. Rana, “Cryptography Encryption Technique Using Circular Bit Rotation in Binary Field,” ICRITO 2020 - IEEE 8th Int. Conf. Reliab. Infocom Technol. Optim. (Trends Futur. Dir., pp. 815–818, 2020, doi: 10.1109/ICRITO48877.2020.9197845.
S. Patel and K. Deb, “Study of Active Earth Pressure behind a Vertical Retaining Wall Subjected to Rotation about the Base,” Int. J. Geomech., vol. 20, no. 4, p. 04020028, 2020, doi: 10.1061/(asce)gm.1943-5622.0001639.
E. N. Citra, “Penerapan Algoritma Vertical Bit Rotation ( VBR ) Dalam Penyimpanan File Online,” MEANS (Media Inf. Anal. dan Sist)., vol. 3, no. 1, pp. 16–23, 2018.
W. Ren et al., “Privacy-preserving using homomorphic encryption in Mobile IoT systems,” Comput. Commun., vol. 165, pp. 105–111, 2021, doi: 10.1016/j.comcom.2020.10.022.
R. Primartha, “Penerapan Enkripsi Dan Dekripsi File Menggunakan Algoritma Data Encryption Standard (DES),” J. Res. Comput. Sci. Appl. Informatics Eng. Dep. Sriwij. Univ., vol. 01, no. 01, pp. 1–19, 2011.
D. Arisandi and B. Yusuf, “Pemeriksaan Integritas Dokumen Dengan Digital Signature Algorithm,” J. Inf. Syst. Informatics Eng., vol. 4, no. 1, pp. 1–6, 2020.
Y. Zhang and D. Xiao, “An image encryption scheme based on rotation matrix bit-level permutation and block diffusion,” Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 1, pp. 74–82, 2014, doi: 10.1016/j.cnsns.2013.06.031.
R. N. Ibrahim, “Perangkat Lunak Keamanan Data Menggunakan Algoritma Kriptografi Simetri Tiny Ecryption Algorithm (TEA),” J. Comput., vol. 13, no. 1, pp. 1–10, 2019.
C. Xu, J. Sun, and C. Wang, “A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems,” Multimed. Tools Appl., vol. 79, no. 9–10, pp. 5573–5593, 2020, doi: 10.1007/s11042-019-08273-x.
R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” Int. J. Secur. its Appl., vol. 9, no. 4, pp. 289–306, 2015, doi: 10.14257/ijsia.2015.9.4.27.