MODIFIKASI KRIPTOGRAFI KLASIK VIGENERE CIPHER MENGGUNAKAN ONE TIME PAD DENGAN ENKRIPSI BERLANJUT

The development of communication is increasingly rapid which does not escape from various threats such as eavesdropping or data theft, because that security aspect of data security is now very calculated. Various ways have been done to secure data that contains confidential information. One method used is to scramble the data into unclear content, so that when tapped it will be difficult to find out the actual information content. Encryption techniques by changing and randomizing the original form of data are called cryptography. Vigenere cipher is one type of classical cryptography algorithm that is popular and often used. This Vigenere cipher uses a substitution technique in encrypting the message where each plaintext character in the message will be encrypted into another character in the ciphertext based on the key used. One Pad algorithm is one algorithm that has perfection when encrypting and decrypting it. The basic concept of the One Time Pad algorithm is almost the same as the Vigenere algorithm, except that in this algorithm the key is generated randomly. In this paper, we will explain how to strengthen Vigenere cipher by modifying Vigenere ciphers. Modifications are carried out by applying One Time Pad encryption generated from the key and the next key generation technique using Vigenere encryption continues so that the key used for the coding will be different from the key used previously. With the use of this method, the connection between plaintext and ciphertext will become less and more difficult to solve cryptanalis. Keywords: Cryptography, Modification, Vigenere Cipher, One Time Pad, and Cyber Security .

[1]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[2]  Yan Shi,et al.  Classification of Sputum Sounds Using Artificial Neural Network and Wavelet Transform , 2018, International journal of biological sciences.

[3]  P. Pulli,et al.  Tele-guidance based orientation and mobility system for visually impaired and blind persons , 2016 .

[4]  Hanif Al Fatta,et al.  PENGUJIAN USABILITY ANTARMUKA APLIKASI BRAILLE SMART PADA SISWA TU¬NANETRA , 2017 .

[5]  Febi Nur Salisah,et al.  ANALISIS KUALITAS LAYANAN E-COMMERCE TERHADAP KEPUASAN PELANGGAN MENGGUNAKAN METODE E-SERVQUAL (Studi Kasus: Lejel Home Shopping Pekanbaru) , 2016 .

[6]  Ivo Colanus Rally Drajana METODE SUPPORT VECTOR MACHINE DAN FORWARD SELECTION PREDIKSI PEMBAYARAN PEMBELIAN BAHAN BAKU KOPRA , 2017 .

[7]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[8]  Alexander Lerch,et al.  An Introduction to Audio Content Analysis: Applications in Signal Processing and Music Informatics , 2012 .

[9]  Manvendra Singh,et al.  Speech Recognition Using Neural Networks , 2011 .

[10]  M Nithin,et al.  Classification of Arrhythmia using Wavelet Transform and Neural Network Model , 2018 .

[11]  Joko Riyanto Perbandingan Metode Weighted Product (WP) dan Simple Additive Weighting (SAW) Penilaian Kinerja Guru pada Madrasah Ibtidaiyah Negeri 3 Jakarta , 2017 .

[12]  Jonathan Vestin Quality of Service Analysis for CloudMAC , 2014 .

[13]  C. Yeh A Problem‐based Selection of Multi‐attribute Decision‐making Methods , 2002 .

[14]  Yudi Prayudi,et al.  Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data , 2005 .

[15]  Vinh Pham,et al.  Performing Gateway Load Balancing in MANETs , 2012 .

[16]  Ely Setyo Astuti,et al.  SISTEM PAKAR DETEKSI KERUSAKAN MESIN DIESEL PLTD MENGGUNAKAN METODE FORWARD CHAINING , 2016 .

[17]  Yeni Melia Multi Attribute Decision Making Using Simple Additive Weighting and Weighted Product in Investment , 2016 .

[18]  Enaam Ghanem Saeed,et al.  Arabic Word Recognition Using Wavelet Neural Network , 2010 .

[19]  Faramarz Sadeghi,et al.  Designing and Implementing of Intelligent Emotional Speech Recognition with Wavelet and Neural Network , 2016 .

[20]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[21]  Zulkifli Matondang,et al.  VALIDITAS DAN RELIABILITAS SUATU INSTRUMEN PENELITIAN , 2009 .

[22]  Pri Priyono,et al.  METODE PENELITIAN KUANTITATIF , 2008 .

[23]  Mehmed Kantardzic,et al.  Data-Mining Concepts , 2011 .

[24]  Riska Nurtantyo Sarbini,et al.  Menggunakan Metode Forward Chaining Berbasis Android , 2019 .

[25]  Dendy Pratama,et al.  Rancang Bangun Alat dan Aplikasi untuk Para Penyandang Tunanetra Berbasis Smartphone Android , 2016 .

[26]  Eko Prasetyo,et al.  Data Mining: Konsep dan Aplikasi menggunakan MATLAB , 2015 .

[27]  M. Hakim ANALISIS MODEL PENERIMAAN PENGGUNA SISTEM PELAPORAN PAJAK ONLINE , 2016 .

[28]  Xiaoxu Yu,et al.  A PSO-SVM-based 24 Hours Power Load Forecasting Model , 2015 .

[29]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[30]  Rachmat Trijono,et al.  Metodologi Penelitian Kuantitatif , 2016 .

[31]  Sugiyono Metode Penelitian Kuantitatif Kualitatif dan R&D , 2012 .

[32]  Phitsa Mauliana,et al.  Sistem Pakar Diagnosis Kerusakan Mobil Toyota Kijang LSX Menggunakan Metode Forward Chaining , 2017 .

[33]  Riki Siregar Sistem Pakar Analisa Kerusakan Pada Sepeda Motor Honda Beat Injection Dengan Metode Backward Chaining , 2018 .

[34]  Junyoung Heo,et al.  Stock Price Prediction Based on Financial Statements Using SVM , 2016 .

[35]  Frank Rubin,et al.  One-Time Pad Cryptography , 1996, Cryptologia.

[37]  C. Burrus,et al.  Introduction to Wavelets and Wavelet Transforms: A Primer , 1997 .

[38]  Ivan Paulov Routing in a Virtualised Environment with RouterOS , 2015 .

[39]  Mayank Kumar,et al.  Equal Cost Multipath Routing in IP , 2014 .

[40]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.