Kriptografi Polyalphabetic

Yurika Permanasari, Erwin Harahap

Abstract


Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan. Algoritma polyalphabetic cipher membuat ciperteks lebih kuat untuk dapat dipecahkan karena karakter plainteks yang sama tidak dienkripsi dengan cipherteks yang sama. Kunci enkripsi polyalphabetic cipher dapat berbeda sehingga mempunyai kemungkinan kombinasi yang lebih bervariasi dan lebih sulit dipecahkan. Metode Vigenere cipher menjadi dasar dari polyalphabetic substitution cipher. Teknik enkripsi Vigenere cipher menggunakan tabel yang dikenal dengan tabel Vigenere yang digunakan dan menjadi acuan dibeberapa algoritma pengembangan metode polyalphabetic cipher. Metode polyalphabetic cipher lain adalah playfair cipher, menggunakan tabel kunci berupa matriks 5x5 untuk proses enkripsi sehingga memiliki 25! kemungkinan kunci yang cukup sulit dipecahkan.

Kata kunci : polyalphabetic cipher, vigenre cipher, playfair cipher

Abstract. (Polyalphabetic Cryptography) Polyalphabetic cryptography is an improvisation of monoalphabetic substitution techniques. Polyalphabetic substitution cipher performs one-time monoalphabetic cryptographic technique for a message text message. The polyalphabetic cipher algorithm makes cipertext stronger to be solved because the same plaintext character is not encrypted with the same ciphertext. The key to polyalphabetic cipher encryption can be different so that it has a more varied and more difficult to solve combination possibilities. The Vigenere cipher method is the basis of polyalphabetic substitution cipher. Vigenere cipher encryption techniques use tables known as Vigenere tables which are used and become references in several algorithms for developing polyalphabetic cipher methods. Another polyalphabetic cipher method is playfair cipher, using a key table in the form of a 5x5 matrix for the encryption process so that it has 25! Possible keys that are quite difficult to solve.

Keywords: polyalphabetic cipher, vigenere cipher, playfair cipher


References


Munir, Rinaldi. Kriptografi. Informatika, Bandung, 2009

Menezes, Alfred J., Paul C. van Oorschot and Scott A.Vanstone, Handbook of Applied Cryptography, 5th printing,CRC Press, 2001

Schenier, Bruce. Applied Cryptography (Protocol, Algorithm, and Source Code in C), 2nd edition, John Wiley & Sons, New York, 1996.

Stallings, William. Cryptography and Network Security Principles and Practices. International Edition 3rd edition, Prentice Hall USA, 2003.

Y. Permanasari, E. Harahap. Algoritma Data Encryption Standard (DES) Pada Electronic Code Book (ECB). Jurnal Matematika UNISBA, Vol. 6, No. 1. 2007. pp. 77-84.

A. Priatmoko, E. Harahap. Implementasi Algoritma DES Menggunakan MATLAB. Jurnal Matematika UNISBA, Vol. 16, No. 1. 2017.

Y. Permanasari. Kriptografi Klasik Monoalphabetic. Jurnal Matematika UNISBA, Vol. 16, No. 1. 2017.

R. Tennekoon, J. Wijekoon, E. Harahap, dan H. Nishi. Per-hop data encryption protocol for transmitting data securely over public netrwork. Procedia Computer Science. Volume. 32. 2014. pp. 965-972. DOI: 10.1016/i.procs.2014.05.519

R. Tennekoon, J. Wijekoon, E. Harahap, H. Nishi, E. Saito, S Katsura. Per hop data encryption protocol for transmission of motion control data over public networks. Proceeding Advanced Motion Control (AMC) on IEEE 13th International Workshop, Yokohama, Japan. 2014. pp.128-133.

A. Tulloh, Y. Permanasari, E. Harahap. 2016. Kriptografi Advanced Encryption Standard (AES) Untuk Penyandian File Dokumen. Jurnal Matematika UNISBA. Vol. 15 No 1, Mei 2016. pp. 7-14.




DOI: https://doi.org/10.29313/jmtm.v17i1.4065

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Matematika

ISSN : 1412-5056 | E-ISSN 2598-8980  

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Indexed by: