Effectiveness of Text Messages Using Substitution Ciphers and Transposition Ciphers

Authors

  • Disnu Panggabean Universitas Islam Negeri Sumatera Utara
  • Siti Aisyah Hasibuan Universitas Islam Negeri Sumatera Utara
  • Yuda Fakhri Roza Universitas Islam Negeri Sumatera Utara

DOI:

https://doi.org/10.55537/bigint.v2i1.578

Keywords:

Classical Cryptography, Substitution, Transposition

Abstract

The rapid development of communication technology has brought many benefits. One technique that is always used is news channels. Currently, chat applications are widely used, everyone uses messaging applications as a communication tool to send accurate information, and everyone is increasingly satisfied using these applications. Technology has emerged to convey messages from sender to recipient more efficiently. Message content; He; Security, social, education and work and recreation. This article explains how effective text-based message security is using substitution and transposition cryptographic methods. With the introduction of encryption processes, interception of text messages should be minimized. Of these two methods, the performance test results show that all combinations of encryption and decryption are truly successful in returning the ciphertext to its original plaintext.

References

M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018, doi: 10.24843/mite.2018.v17i01.p08.

“PAUD Lectura: Jurnal Pendidikan Anak Usia Dini, Vol 4, No 2, April 2021,” vol. 4, no. 2, pp. 1–7, 2021, doi: 10.31849/paud-lectura.v4i02.5315.

M. Sari, “NATURAL SCIENCE : Jurnal Penelitian Bidang IPA dan Pendidikan IPA , ISSN : 2715-470X ( Online ), 2477 – 6181 ( Cetak ) Penelitian Kepustakaan ( Library Research ) dalam Penelitian Pendidikan IPA,” vol. 6, no. 1, pp. 41–53, 2020.

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

A. Usman, “DAN TEKNIK TRANSPOSISI DALAM PENGAMANAN PESAN TEKS,” pp. 209–216, 2020.

A. Hidayati, “( AES ) UNTUK FILE TEKS THE DEVELOPMENT OF A CRYPTOGRAPHY APPLICATION WITH CAESAR CIPHER AND ADVANCE ENCRYPTION STANDARD ( AES ),” pp. 213–222, 2015.

Y. D. Putri et al., “PENERAPAN KRIPTOGRAFI CAESAR CIPHER PADA FITUR CHATTING SISTEM INFORMASI FREELANCE APPLICATION OF CAESAR CIPHER CRIPTOGRAPHY IN FREELANCE,” vol. 2, no. 2, pp. 87–94, 2019.

J. I. Komputer, F. Matematika, P. Alam, U. M. Samarinda, and K. Timur, “Hamdani,” vol. 7, no. 2, pp. 70–74, 2012.

Stalling, W. 1998. Cryptography and Network Security, Principle and Practice 2nd Edition. Pearson Education, Inc.

S. Widiyanto et al., “Pengamanan Pesan Text dengan menggunakan Kriptografi Klasik Metode Shift Chipper dan Metode Substitution Chipper Mhd Arief Hasan,” vol. 7, no. 01, pp. 9–17, 2021.

Downloads

Published

2024-01-31

How to Cite

Panggabean, D. ., Hasibuan, S. A., & Roza, Y. F. . (2024). Effectiveness of Text Messages Using Substitution Ciphers and Transposition Ciphers. Bigint Computing Journal, 2(1), 1–8. https://doi.org/10.55537/bigint.v2i1.578