Pelatihan Teknik Caesar Cipher Terhadap Keamanan Informasi

Asbon Hendra Azhar, Ratih Adinda Destari, Wahyu Sapta Negoro, A Ardansyah

Abstract


The concept of cryptography has been used since ancient times by Julius Caesar and continues to develop today. Based on the era, cryptography is divided into two parts, namely classical cryptography and modern cryptography. The similarity between the two is that they both use mathematical concepts in the technique of creating and breaking a message. But in classical cryptography, the mathematical concepts used are still very simple, such as substitution, permutation and transpose. Meanwhile, in modern cryptography the mathematical concepts used are no longer simple, such as polynomials, prime numbers, groups, rings and fields. The advantage of classical cryptography is that it is easy to encrypt messages, but some encryption techniques also have a fatal weakness, namely that they are very easy to crack. An example of classic cryptography that is very easy to create and solve is the Caesar Cipher which only has 26 possible keys. Caesar Cipher is included in the Substitution Cipher encryption, where a random code or script is obtained by replacing each character in the original text.

Full Text:

PDF

References


Faisal, 2014, Penerapan Kombinasi Sandi Caesar Dan Vigenere Untuk Pengamanan Data Pesan Pada Surat Elektronik, Jakarta.

Rachmawati, Dian dan Candra, Ade., 2015, Implementasi Kombinasi Caesar dan Affine Cipher untuk keamanan Data Teks, Jurnal Edukasi dan Penelitian Informatika (JEPIN), Nomor 2, Volume(1):60-63.

Basuki, A., Paranita, U., & Hidayat, R. 2016. Perancangan Aplikasi Kriptografi Berlapis menggunakan Algoritma Caesar, Transposisi, Vigenere, dan Blok Chiper Berbasis Mobile. Seminar Nasional Teknologi Informasi Dan Multimedia 2016, 1(2), 31–35.

Gurning, R. R. A. (2014). Perancangan aplikasi pengamanan pesan dengan algoritma caesar chiper. Pelita Informatika Budi Darma, VI(April), 106–110.

R. Febrianingsih and A. Hafiz, 2019 Implementasi Kriptografi Berbasis

Caesar Chiper Untuk Keamanan Data,” J. Inf. Dan Komput., vol. 7, no. 2, pp. 81–86.




DOI: http://dx.doi.org/10.30645/jtunas.v5i2.111

DOI (PDF): http://dx.doi.org/10.30645/jtunas.v5i2.111.g109

Refbacks

  • There are currently no refbacks.