Kriptografi Klasik Monoalphabetic
Abstract
Abstrak. Kriptografi berdasarkan arah implementasi dan pembabakan jamannya dibedakan menjadi algoritma kriptografi klasik atau konvensional dan algoritma kriptografi modern. Algoritma kriptografi klasik memberikan konsep dasar pemahaman kriptografi dan dijadikan sebagai dasar algoritma kriptografi modern. Teknik dasar dari algoritma kriptografi klasik adalah cipher substitusi dan chiper transposisi. Kriptografi monoalphabetic adalah algoritma kriptografi dengan teknik substitusi yaitu mengganti setiap karakter dari plainteks dengan satu karakter chiperteks. Cryptoanalysis monoalphabetic chiper dapat menggunakan metode terkaan atau Statistik (analisis frekuensi). Informasi yang dibutuhkan untuk kedua metode ini adalah mengetahui bahasa yang digunakan untuk plainteks dan konteks plainteks-nya.
Kata kunci: kriptografi klasik, chiper substitusi, monoalphabetic chiper, metode terkaan, analisis frekuensi
Abstract. (Classical Monoalphabetic Cryptography). Cryptography based on the direction of implementation and dissipation of its era is divided into classical or conventional cryptographic algorithms and modern cryptographic algorithms. Classical cryptographic algorithms provide a basic concept of understanding cryptography and serve as the basis for modern cryptographic algorithms. The basic technique of classical cryptographic algorithms is substitution cipher and transposition cipher. Monoalphabetic cryptography is a cryptographic algorithm with a substitution technique that replaces each character from plaintext with one chipertext character. Monoalphabetic chiper cryptoanalysis can use guess or statistical methods (frequency analysis). The information needed for both methods is to know the language used for plaintext and the context of its plaintext.
Keywords: classical cryptography, substitute cipher, monoalphabetic cipher, guess method, frequency analysis
Full Text:
PDF (Bahasa Indonesia)References
Munir, Rinaldi, Kriptografi, Informatika, Bandung, 2009
Menezes, Alfred J., Paul C. van Oorschot and Scott A.Vanstone, “Handbook of Applied Cryptography”, 5th printing,CRC Press, 2001
Schenier, Bruce, Applied Cryptography (Protocol ,Algorithm,and Source Code in C), 2nd edition, John Wiley & Sons, New York, 1996.
Stallings, William, Cryptography and Network Security Principles and Practices, International Edition 3rd edition, Prentice Hall USA, 2003
Y. Permanasari, E. Harahap. Algoritma Data Encryption Standard (DES) Pada Electronic Code Book (ECB). Jurnal Matematika UNISBA, Vol. 6, No. 1. 2007. pp. 77-84.
R. Tennekoon, J. Wijekoon, E. Harahap, dan H. Nishi. Per-hop data encryption protocol for transmitting data securely over public netrwork. Procedia Computer Science. Volume. 32. 2014. pp. 965-972. DOI: 10.1016/i.procs.2014.05.519
R. Tennekoon, J. Wijekoon, E. Harahap, H. Nishi, E. Saito, S Katsura. Per hop data encryption protocol for transmission of motion control data over public networks. Proceeding Advanced Motion Control (AMC) on IEEE 13th International Workshop, Yokohama, Japan. 2014. Pp.128-133
A. Tulloh, Y. Permanasari, E. Harahap. 2016. Kriptografi Advanced Encryption Standard (AES) Untuk Penyandian File Dokumen. Jurnal Matematika UNISBA. Vol. 15 No 1, Mei 2016. pp. 7-14.
DOI: https://doi.org/10.29313/jmtm.v16i1.2543
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 Matematika
ISSN : 1412-5056 | E-ISSN 2598-8980
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Indexed by: