Development of an encryption algorithm based on the Caesar Cipher algorithm

Development of an encryption algorithm based on the Caesar Cipher algorithm

Authors

  • K B Utomo Politeknik Negeri Samarinda, Samarinda, Indonesia
  • A R Hakim Politeknik Negeri Samarinda, Samarinda, Indonesia
  • B Cahyono Politeknik Negeri Samarinda, Samarinda, Indonesia

Keywords:

Encryption algorithm, Caesar cipher algorithm, Data security

Abstract

The problem in securing data is still an important aspect in maintaining data storage, especially data stored in digital form. This causes due to very rapid progress in the field of computers with the concept of an open system that has been widely used, so this can make it easier for someone to do data destruction that requires data stored in digital. This security usually uses encryption. Encryption is the process of communicating information by making that information unreadable without the help of special knowledge. So that encrypted data can be read, the decryption process is needed. The decryption process is used so that the message can be read again by the intended party. One of the algorithms to carry out the encryption and decryption process is the Caesar cipher algorithm, which algorithm is one of the most widely studied. However, the Caesar cipher algorithm has a disadvantage including all letters can be covered, do not recognize lowercase or uppercase letters. It is necessary for the development of the Caesar cipher. The purpose of this research is to develop an encryption algorithm based on the caesar cipher algorithm. A result of this research is a development of a Caesar cipher algorithm that includes more characters, namely A-Z, a-z, 0-9, and comma and space characters. In this study also used a change of 3 characters vertically (below).

References

[1] A. Pradipta and S. A. Yogyakarta, “Implementasi Metode Caesar Chiper Alphabet Majemuk Dalam Kriptografi Untuk Pengamanan Informasi,” ijns.org Indonesian Journal on Networking and Security, vol. 5, p. 3, 2016.

[2] A. Kurnia, A., and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Batik Ceplok Yogyakarta,” vol. 8, no. 1, 2019.

[3] M. Nurtanzis Sutoyo, “Kombinasi Algoritma Kriptografi Caesar Chiper dan Vigenere Chiper Untuk Keamanan Data,” vol. 2, no. 1, 2016.

[4] R. Febrianingsih and A. Hafiz, “Implementasi Kriptografi Berbasis Caesar Chiper Untuk Keamanan Data.”

[5] A. Anto Tri Susilo, “Penerapan Algoritma Asimetris RSA Untuk Keamanan Data Pada Aplikasi Penjualan CV. Sinergi Computer Lubuklinggau Berbasis Web,” Jurnal SIMETRIS, vol. 9, no. 2, 2018.

[6] B. Schneier, Applied cryptography : protocols, algorithms, and source code in C. Wiley, 1996.

[7] M. Algoritma Caesar Cipher, H. Dwi Purnomo, and I. Sembiring, “Modifikasi Algoritma Caesar Cipher pada Kode ASCII dalam Meningkatkan Keamanan Pesan Teks,” JIFOTECH (Journal of Information Technology), vol. 2, no. 1, 2022.

[8] F. Maqsood, M. Ahmed, M. Mumtaz Ali, and M. Ali Shah, “Cryptography: A Comparative Analysis for Modern Techniques,” 2017. [Online]. Available: www.ijacsa.thesai.org

[9] S. Godara, S. Kundu, and R. Kaler, “An Improved Algorithmic Implementation of Rail Fence Cipher,” International Journal of Future Generation Communication and Networking, vol. 11, no. 2, pp. 23–32, Mar. 2018, doi: 10.14257/ijfgcn.2018.11.2.03.

[10] T. Zebua and S. Limun, “Analisa Dan Implementasi Algoritma Triangle Chain Pada Penyandian Record Database,” Pelita Informatika Budi Darma, vol. III, no. 2 , 2013.

Downloads

Published

2024-10-20

How to Cite

Development of an encryption algorithm based on the Caesar Cipher algorithm. (2024). BIS Information Technology and Computer Science, 1, V124001. https://doi.org/10.31603/bistycs.114

Similar Articles

You may also start an advanced similarity search for this article.