Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : The IJICS (International Journal of Informatics and Computer Science)

How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm Taronisokhi Zebua; Eferoni Ndruru
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.932 KB) | DOI: 10.30865/ijics.v3i2.1404

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key
Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text Fitarius Humendru; Taronisokhi Zebua
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.421 KB) | DOI: 10.30865/ijics.v2i1.997

Abstract

Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal