Effectiveness of Text Messages Using Substitution Ciphers and Transposition Ciphers
DOI:
https://doi.org/10.55537/bigint.v2i1.578Keywords:
Classical Cryptography, Substitution, TranspositionAbstract
The rapid development of communication technology has brought many benefits. One technique that is always used is news channels. Currently, chat applications are widely used, everyone uses messaging applications as a communication tool to send accurate information, and everyone is increasingly satisfied using these applications. Technology has emerged to convey messages from sender to recipient more efficiently. Message content; He; Security, social, education and work and recreation. This article explains how effective text-based message security is using substitution and transposition cryptographic methods. With the introduction of encryption processes, interception of text messages should be minimized. Of these two methods, the performance test results show that all combinations of encryption and decryption are truly successful in returning the ciphertext to its original plaintext.
Downloads
References
[1] M. A. Maricar and N. P. Sastra, “Efektivitas pesan teks dengan cipher substitusi, Vigenere cipher, dan cipher transposisi,” Majalah Ilmiah Teknologi Elektro, vol. 17, no. 1, pp. 59–64, Jan. 2018, doi: 10.24843/mite.2018.v17i01.p08.
[2] D. Lestari, “Peran guru dalam meningkatkan perkembangan sosial anak usia dini,” PAUD Lectura: Jurnal Pendidikan Anak Usia Dini, vol. 4, no. 2, pp. 1–7, Apr. 2021, doi: 10.31849/paud-lectura.v4i02.5315.
[3] M. Sari, “Penelitian kepustakaan (library research) dalam penelitian pendidikan IPA,” Natural Science: Jurnal Penelitian Bidang IPA dan Pendidikan IPA, vol. 6, no. 1, pp. 41–53, 2020.
[4] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi kriptografi pengamanan data pada pesan teks, isi file dokumen, dan file dokumen menggunakan algoritma Advanced Encryption Standard,” Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, vol. 10, no. 1, pp. 20–27, 2016, doi: 10.30872/jim.v10i1.23.
[5] A. Usman, “Teknik transposisi dalam pengamanan pesan teks,” in Prosiding Seminar Nasional Teknologi Informasi dan Komputer, 2020, pp. 209–216.
[6] A. Hidayati, “Pengembangan aplikasi kriptografi dengan Caesar cipher dan Advanced Encryption Standard (AES) untuk file teks,” in Prosiding, 2015, pp. 213–222.
[7] Y. D. Putri, M. Harahap, and R. R. Fauziah, “Penerapan kriptografi Caesar cipher pada fitur chatting sistem informasi freelance,” Jurnal Teknologi dan Sistem Informasi, vol. 2, no. 2, pp. 87–94, 2019.
[8] H. Hamdani, “Implementasi kriptografi pada jaringan komputer,” Jurnal Ilmu Komputer, vol. 7, no. 2, pp. 70–74, 2012.
[9] W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. Upper Saddle River, NJ, USA: Pearson Education, 1998.
[10] S. Widiyanto, M. A. Hasan, and R. Hidayat, “Pengamanan pesan teks menggunakan kriptografi klasik metode shift cipher dan metode substitution cipher,” Jurnal Teknologi Informasi dan Komputer, vol. 7, no. 1, pp. 9–17, Jan. 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Disnu Panggabean, Siti Aisyah Hasibuan, Yuda Fakhri Roza

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.