Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2
Main Article Content
Abstract
Information has become precious and essential for all fields, so it is crucial to carry out information security. The principle of information security is to protect and safeguard information with the aim that the information is not entitled to be read, modified, or deleted by anyone who does not have rights to it. The purpose of our research is to analyze how the caesar cipher and vernam cipher methods are jointly used in the cryptographic process and are expected to produce a high level of data encryption so that it can increase the security of data or messages. The research applies the combination of the caesar cipher and vernam cipher methods to encrypt text data or messages. Using the secret key value will convert the input message into an encrypted message that is difficult to crack and cannot be decrypted again. The input text and the encrypted data have no resemblance to maintain the confidentiality of the information or data contents.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
A. A. Nurdin and D. Djuniadi, “Securing Audio Chat With Cryptool-Based Twofish Algorithm,” J. Soft Comput. Explor., vol. 3, no. 1, pp. 37–43, 2022, doi: 10.52465/joscex.v3i1.65.
D. A. A. Pertiwi and D. Djuniadi, “Simulations of text encryption and decryption by applying vertical bit rotation algorithm,” J. Soft Comput. Explor., vol. 2, no. 2, pp. 61–66, 2021.
A. Purwinarko and W. Hardyanto, “A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications,” Sci. J. Informatics, vol. 5, no. 1, p. 80, 2018, doi: 10.15294/sji.v5i1.8151.
N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. Electr. Eng., vol. 71, no. June, pp. 28–42, 2018, doi: 10.1016/j.compeleceng.2018.06.006.
S. Agarwal, “Symmetric Key Encryption using Iterated Fractal Functions,” Int. J. Comput. Netw. Inf. Secur., vol. 9, no. 4, pp. 1–9, 2017, doi: 10.5815/ijcnis.2017.04.01.
A. S. Mabruri, “Data Security System of Text Messaging Based on Android Mobile Devices Using Advanced Encrytion Standard Dynamic,” J. Soft Comput. Explor., no. October 2000, pp. 39–46, 2020.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/ijacsa.2017.080659.
H. D. J. R. H. Utami, R. Arifudin, and A. Alamsyah, “Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit,” Sci. J. Informatics, vol. 6, no. 1, pp. 34–44, 2019, doi: 10.15294/sji.v6i1.17589.
K. Goyal and S. Kinger, “Modified caesar cipher for better security enhancement,” Int. J. Comput. Appl., vol. 73, no. 3, pp. 975–8887, 2013.
A. R. Dalimunthe, H. Mawengkang, S. Suwilo, and A. Nazam, “Vernam Cipher with Complement Method and Optimization Key with Genetic Algorithm,” in J. Phys.: Conf. Ser., 2019, vol. 1235, no. 1, p. 12030.
D. Nofriansyah et al., “A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” in J. Phys.: Conf. Ser., 2018, vol. 954, no. 1, p. 12003.
Alamsyah, M. A. Muslim, and B. Prasetiyo, “Data hiding security using bit matching-baACsed steganography and cryptography without change the stego image quality,” J. Theor. Appl. Inf. Technol., vol. 82, no. 1, pp. 106–112, 2015.
M. K. Loussios, “Cryptool 2 in Teaching Cryptography,” J. Comput. Model., vol. 4, no. 1, pp. 1792–8850, 2014.
M. A. Muslim, B. Prasetiyo, and Alamsyah, “Implementation twofish algorithm for data security in a communication network using library chilkat e,” Int. J. Comput. Sci. Issues, vol. 10, no. 1, pp. 674–680, 2013.
R. K. Yadav, “Cryptography on Android Message Applications – A Review,” Int. J. Comput. Sci. Eng., vol. 5, no. 05, pp. 362–367, 2013.
G. Ye, K. Jiao, H. Wu, C. Pan, and X. Huang, “An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem,” Int. J. Bifurc. Chaos, vol. 30, no. 15, p. 2050233, 2020.
T. J. Murray, “Cryptographic transformation of data relationships,” Inf. Manag., vol. 2, no. 3, pp. 95–98, 1979, doi: 10.1016/0378-7206(79)90040-5.
E. Bout, V. Loscri, and A. Gallais, “How Machine Learning changes the nature of cyberattacks on IoT networks: A survey,” IEEE Commun. Surv. Tutorials, vol. 24, no. 1, pp. 248–279, 2021.
A. Al-Hyari, K. Aldebei, Z. A. Alqadi, and B. Al-Ahmad, “Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography,” IEEE Access, vol. 10, pp. 69388–69397, 2022.
A. P. Utama Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System,” IOSR J. Mob. Comput. Appl., vol. 03, no. 04, pp. 11–16, 2016, doi: 10.9790/0050-03041116.
C. Atika Sari, E. H. Rachmawanto, and C. A. Haryanto, “Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security,” Sci. J. Informatics, vol. 5, no. 2, pp. 105–117, 2018, doi: 10.15294/sji.v5i2.14844.
S. D. Sanap and V. More, “Analysis of encryption techniques for secure communication,” 2021 Int. Conf. Emerg. Smart Comput. Informatics, ESCI 2021, vol. 1, no. 2, pp. 290–294, 2021, doi: 10.1109/ESCI50559.2021.9396926.
B. Y. Ryabko, “The Vernam cipher is robust to small deviations from randomness,” Probl. Inf. Transm., vol. 51, no. 1, pp. 82–86, 2015.
R. Hammad et al., “Implementation of combined steganography and cryptography vigenere cipher, caesar cipher and converting periodic tables for securing secret message,” J. Phys. Conf. Ser., vol. 2279, no. 1, pp. 1–7, 2022, doi: 10.1088/1742-6596/2279/1/012006.
N. Karthikeyan, K. Kousalya, N. Jayapandian, and G. Mahalakshmi, “Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm,” Mater. Today Proc., 2021.
V. Manjunatha, A. Rao, and A. Khan, “Complex key generation with secured seed exchange for Vernam cipher in security applications,” Mater. Today Proc., vol. 35, pp. 497–500, 2019, doi: 10.1016/j.matpr.2020.03.132.
S. Dey, J. Nath, and A. Nath, “An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm,” Int. J. Comput. Appl., vol. 46, no. 20, pp. 46–53, 2012.
P. Pavithran, S. Mathew, S. Namasudra, and A. Singh, “Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine,” Cluster Comput., pp. 1–17, 2022.
Ç. K. Koç, “About cryptographic engineering,” in Cryptographic engineering, Springer, 2009, pp. 1–4.
K. Gai, M. Qiu, H. Zhao, and J. Xiong, “Privacy-aware adaptive data encryption strategy of big data in cloud computing,” in 2016 IEEE 3rd Int. Conf. Cyber Secur. Cloud Comput. (CSCloud), 2016, pp. 273–278.
B. Purnama and A. H. H. Rohayani, “A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted,” Procedia Comput. Sci., vol. 59, pp. 195–204, 2015.