Muhammad Fadlan, Suprianto, Muhammad, Yusni Amaliah
{"title":"Double Layered Text Encryption using Beaufort and Hill Cipher Techniques","authors":"Muhammad Fadlan, Suprianto, Muhammad, Yusni Amaliah","doi":"10.1109/ICIC50835.2020.9288538","DOIUrl":null,"url":null,"abstract":"Data is critical, especially in the current cyber era. Maintaining data confidentiality and security is one thing that must be done so that the data owned cannot be used by other parties who are not interested. Cryptography is one solution that can be utilized. In cryptography, there are various methods, including the Beaufort Cipher. The Beaufort cipher method is a cryptographic method using simple calculations. This method's weakness is to use mathematical calculations that are quite simple and include methods that are already quite old. Despite this fact, this method is still one of the popularly used in securing data. One way to improve data security by using this method is through integration with other cryptographic methods, one of them is the hill cipher. In this research, the encryption process is known as Double Layered Encryption. The encryption process will be done in two layers, namely using Beaufort cipher and Hill cipher. The quality of the proposed encryption process is measured using an Avalanche Effect (AE) value. The results show that the proposed method has a higher Avalanche Effect than the Beaufort cipher only and Hill cipher only methods.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"691 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fifth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC50835.2020.9288538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Data is critical, especially in the current cyber era. Maintaining data confidentiality and security is one thing that must be done so that the data owned cannot be used by other parties who are not interested. Cryptography is one solution that can be utilized. In cryptography, there are various methods, including the Beaufort Cipher. The Beaufort cipher method is a cryptographic method using simple calculations. This method's weakness is to use mathematical calculations that are quite simple and include methods that are already quite old. Despite this fact, this method is still one of the popularly used in securing data. One way to improve data security by using this method is through integration with other cryptographic methods, one of them is the hill cipher. In this research, the encryption process is known as Double Layered Encryption. The encryption process will be done in two layers, namely using Beaufort cipher and Hill cipher. The quality of the proposed encryption process is measured using an Avalanche Effect (AE) value. The results show that the proposed method has a higher Avalanche Effect than the Beaufort cipher only and Hill cipher only methods.