Muhammad Fadlan, Suprianto, Muhammad, Yusni Amaliah
{"title":"使用博福特和希尔密码技术的双层文本加密","authors":"Muhammad Fadlan, Suprianto, Muhammad, Yusni Amaliah","doi":"10.1109/ICIC50835.2020.9288538","DOIUrl":null,"url":null,"abstract":"Data is critical, especially in the current cyber era. Maintaining data confidentiality and security is one thing that must be done so that the data owned cannot be used by other parties who are not interested. Cryptography is one solution that can be utilized. In cryptography, there are various methods, including the Beaufort Cipher. The Beaufort cipher method is a cryptographic method using simple calculations. This method's weakness is to use mathematical calculations that are quite simple and include methods that are already quite old. Despite this fact, this method is still one of the popularly used in securing data. One way to improve data security by using this method is through integration with other cryptographic methods, one of them is the hill cipher. In this research, the encryption process is known as Double Layered Encryption. The encryption process will be done in two layers, namely using Beaufort cipher and Hill cipher. The quality of the proposed encryption process is measured using an Avalanche Effect (AE) value. The results show that the proposed method has a higher Avalanche Effect than the Beaufort cipher only and Hill cipher only methods.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"691 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Double Layered Text Encryption using Beaufort and Hill Cipher Techniques\",\"authors\":\"Muhammad Fadlan, Suprianto, Muhammad, Yusni Amaliah\",\"doi\":\"10.1109/ICIC50835.2020.9288538\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data is critical, especially in the current cyber era. Maintaining data confidentiality and security is one thing that must be done so that the data owned cannot be used by other parties who are not interested. Cryptography is one solution that can be utilized. In cryptography, there are various methods, including the Beaufort Cipher. The Beaufort cipher method is a cryptographic method using simple calculations. This method's weakness is to use mathematical calculations that are quite simple and include methods that are already quite old. Despite this fact, this method is still one of the popularly used in securing data. One way to improve data security by using this method is through integration with other cryptographic methods, one of them is the hill cipher. In this research, the encryption process is known as Double Layered Encryption. The encryption process will be done in two layers, namely using Beaufort cipher and Hill cipher. The quality of the proposed encryption process is measured using an Avalanche Effect (AE) value. The results show that the proposed method has a higher Avalanche Effect than the Beaufort cipher only and Hill cipher only methods.\",\"PeriodicalId\":413610,\"journal\":{\"name\":\"2020 Fifth International Conference on Informatics and Computing (ICIC)\",\"volume\":\"691 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Fifth International Conference on Informatics and Computing (ICIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIC50835.2020.9288538\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fifth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC50835.2020.9288538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Double Layered Text Encryption using Beaufort and Hill Cipher Techniques
Data is critical, especially in the current cyber era. Maintaining data confidentiality and security is one thing that must be done so that the data owned cannot be used by other parties who are not interested. Cryptography is one solution that can be utilized. In cryptography, there are various methods, including the Beaufort Cipher. The Beaufort cipher method is a cryptographic method using simple calculations. This method's weakness is to use mathematical calculations that are quite simple and include methods that are already quite old. Despite this fact, this method is still one of the popularly used in securing data. One way to improve data security by using this method is through integration with other cryptographic methods, one of them is the hill cipher. In this research, the encryption process is known as Double Layered Encryption. The encryption process will be done in two layers, namely using Beaufort cipher and Hill cipher. The quality of the proposed encryption process is measured using an Avalanche Effect (AE) value. The results show that the proposed method has a higher Avalanche Effect than the Beaufort cipher only and Hill cipher only methods.