Layered security model through integration of Vigenere and Hill Cipher in digital message encryption
DOI:
https://doi.org/10.26905/jisad.v2i2.14005Keywords:
cryptography, Vigenere Chiper, Hill Chiper, layered security, digital messageAbstract
The rapid development of digitalization has a significant impact on data and information protection. One approach to protecting data and information is through the use of cryptography. This study aims to combine the use of the Vigenere and Hill Cipher algorithms in modeling to maintain the security and confidentiality of digital messages. The focus of this study is on the encryption process of digital messages in the form of text. Layered security in this study utilizes the advantages of each algorithm. The combination of these two algorithms is designed to increase encryption complexity and reduce vulnerability to cryptanalysis attacks. The encryption process begins by using the Vigenere Cipher to encrypt the initial message, then the results are re-encrypted using the Hill Cipher. The results of the study show that this layered security model can improve data security and make it difficult for unauthorized parties to crack it. The combination of the Vigenere and Hill Cipher algorithms can be an alternative layered security for digital message encryption in an effort to protect information and data from security threats in the digital era.
Downloads
References
[1] I. Y. Sari et al., Keamanan Data Dan Informasi. Yayasan Kita Menulis, 2020.
[2] F. Az-Zahra, R. Marwati, and R. Sispiyati, “Implementasi QR Code dengan Algoritma Secure Hash Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) yang Ditingkatkan untuk Autentikasi Dokumen Digital,” J. EurekaMatika, vol. 12, no. 1, pp. 11–22, 2024.
[3] N. Chafid and H. Soffiana, “Implementasi Algoritma Kriptografi Klasik Caesar untuk Rancang Bangun Aplikasi E-Voting Berbasis Web (Studi Kasus : SMAN 10 Tangerang),” J. Ilm. Sains dan Teknol., vol. 6, no. 2, pp. 133–145, 2022, doi: 10.47080/saintek.v6i2.2249.
[4] R. W. Asiani and I. Yanti, “Penerapan Kriptografi Caesar Cipher dan Hill Cipher dalam Pengiriman Pesan Rahasia sebagai Media Pembelajaran Matematika Realistik pada Materi Modulo,” Baitul ‘Ulum J. Ilmu Perpust. dan Inf., vol. 6, no. 1, pp. 79–97, 2022.
[5] R. Wardhani, S. R. Nurshiami, and N. Larasati, “Komputasi Enkripsi dan Dekripsi Menggunakan Algoritma Hill Cipher,” J. Ilm. Mat. dan Pendidik. Mat., vol. 14, no. 1, p. 45, 2022, doi: 10.20884/1.jmp.2022.14.1.5727.
[6] N. B. Putra, B. C. Andika, A. D. Purba, and M. Ridwan, “Implementasi Sandi Vigenere Cipher Dalam Mengenkripsikan Pesan,” JOCITIS-J. Sci. Infomatica Robot., vol. 1, no. 1, Art. no. 1, 2023.
[7] N. D. Sari and D. Arius, “Modifikasi Algoritma Hill Cipher dengan Tabel Periodik Unsur Kimia Menggunakan Kode Nomor Operator Seluler di Indonesia,” J. Teknol. Inf., vol. 4, no. 2, pp. 202–207, 2020, doi: 10.36294/jurti.v4i2.1339.
[8] S. Achriadi, Hardisal, Asmaidi, and M. S. Hanafi, “Encryption and Description of RGB Values in Images Using the Hill Chiper Algorithm,” J. Inotera, vol. 9, no. 1, pp. 48–52, 2024, doi: 10.31572/inotera.vol9.iss1.2024.id282.
[9] Noviyanti P and Mira, “Analisa Algoritma Kriptografi Klasik Caesar Cipher Viginere Cipher dan Hill Cipher,” J. Inf. Technol., vol. 2, no. 1, Art. no. 1, Mar. 2022, doi: 10.46229/jifotech.v2i1.387.
[10] A. Queency and S. Sylviani, “Aplikasi Modifikasi Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Konversi Suhu,” Math. Sci. Appl. J., vol. 4, no. 1, Art. no. 1, Oct. 2023, doi: 10.22437/msa.v4i1.28858.
[11] R. Gusmana, Haryansyah, and A. D. Wibisono, “Implementasi Algoritma Hill Cipher Menggunakan Kunci Matriks 2x2 dalam Mengamankan Data Teks,” Gener. J., vol. 7, no. 3, pp. 31–39, 2023, doi: 10.29407/gj.v7i3.21105.
[12] V. S. Ginting, “Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa,” J. Teknol. Inf., vol. 4, no. 2, pp. 241–246, 2020.
[13] H. H. Pratama, Hamdani, R. W. F. Pamungkas, and N. R. Mr, “Evaluasi Performa Sandi Vigenère pada Data Digital Terenkripsi,” JOCITIS-J. Sci. Infomatica Robot., vol. 1, no. 1, Art. no. 1, Sep. 2023.
[14] D. Astuti and C. Sundari, “Implementasi Algoritma Vigenere Cipher untuk Enkripsi dan Dekripsi pada Peresepan Data Obat di Puskesmas Mertoyudan 1 Kabupaten Magelang,” J. Tek. Inf. dan Komput., vol. 5, no. 2, p. 341, 2022, doi: 10.37600/tekinkom.v5i2.534.
[15] C. A. Haris and D. Ariyus, “Kombinasi dan Modifikasi Vigenere Cipher dan Hill Cipher Menggunakan Metode Hybrid Kode Pos, Trigonometri, dan Konversi Suhu Sebagai Pengamanan Pesan,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 15, no. 2, p. 90, 2020, doi: 10.30872/jim.v15i2.3746.
[16] M. Azmi and Z. Zulkarnaen, “Implementasi Kombinasi Caesar Cipher dan Hill Cipher Menggunakan Modifikasi Sandi Morse Untuk Pengamanan Pesan Berbasis Teks,” JTIM J. Teknol. Inf. Dan Multimed., vol. 3, no. 1, Art. no. 1, Apr. 2021, doi: 10.35746/jtim.v3i1.124.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Information System and Application Development

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish in this journal agree to the following terms:
(1) Copyright of the published articles will be transferred to the journal as the publisher of the manuscripts. Therefore, the author confirms that the journal has managed the copyright.
(2) Publisher of JISAD: Journal of Information System and Application Development is the University of Merdeka Malang.
(3) The copyright follows Creative Commons Attribution ShareAlike License (CC BY SA): This license allows to Share - copy and redistribute the material in any medium or format, Adapt - remix, transform, and build upon the material, for any purpose, even commercially.