{"title":"利用Rivest Code 6 (RC6)密钥扩展改进Vigenere算法和一次性填充","authors":"Arif Budiman, Paradise Paradise","doi":"10.28989/compiler.v8i2.481","DOIUrl":null,"url":null,"abstract":"Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"155 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion\",\"authors\":\"Arif Budiman, Paradise Paradise\",\"doi\":\"10.28989/compiler.v8i2.481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6\",\"PeriodicalId\":93739,\"journal\":{\"name\":\"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)\",\"volume\":\"155 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.28989/compiler.v8i2.481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28989/compiler.v8i2.481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion
Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6