Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security

  • Agung Agung UNSIKA
  • Nono Heryana Universitas Singaperbangsa Karawang
  • Arip Solehudin
Keywords: Caesar Cipher, Kriptografi, Hill Cipher

Abstract

The progress of communication technology has had a positive impact on human life, including in the field of education. The education office is currently implementing computer-based exams starting from the State Higher Education Entrance Joint Selection (SBMPTN) exam to the School Final Examination. But with the implementation of computer-based exams this is of course the less secure the level, therefore the authors make this research with the aim of securing the exam data that will be tested with Hill cipher cryptography and Caesar cipher. Cryptography is a technique of hiding data that is done to secure data, in this case cryptography aims to secure data on exam questions.

References

R. Kaur, “Rectangular Matrix with Left Inverse For Variation in Hill Cipher: Communication Safe Guard,” J. Gujarat Res. Soc., vol. 21, no. 8, pp. 1234–1240, 2019.

C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” arXiv Prepr. arXiv2003.06557, 2020.

C. Rajvir, S. Satapathy, S. Rajkumar, and L. Ramanathan, “Image Encryption Using Modified Elliptic Curve Cryptography and Hill Cipher,” in Smart Intelligent Computing and Applications, Springer, 2020, pp. 675–683.

K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” arXiv Prepr. arXiv2003.11936, 2020.

I. Irmayani, “Application of Matrix in Hill Cipher

Algorithm,” in International Conference on Natural and Social Sciences (ICONSS) Proceeding Series, 2019, pp. 141–147.

P. E. Coggins III and T. Glatzer, “An Algorithm for a Matrix-Based Enigma Encoder from a Variation of the Hill Cipher as an Application of 2× 2 Matrices,” PRIMUS, vol. 30, no. 1, pp. 1–18, 2020.

D. Kurniawan and B. Priyatna, “Pengamanan Data Berbasis Mobile Android Dengan Penggabungan Linear Feedback Shift Register (Lfsr) Dan Modifikasi Matriks Kunci Algoritma Kriptografi Playfair Cipher,” J. Telemat. MKOM Vol, vol. 10, no. 1, 2018.

A. Behera, A. Tripathy, A. R. Tripathy, and S. Rath, “Random Invertible Key Matrix Decomposition for Classical Cryptography,” in Advanced Computing and Intelligent Engineering, Springer, 2020, pp. 553–563.

S. Kromodimoeljo, Teori dan Aplikasi Kriptografi, Jakarta: SPK IT Consulting, 2010.

M. Khoerudin, "Algoritma Hill Cipher (Sandi Hill),"Materi Perkuliahan Pada Jurusan Teknik Informatika), 22 Maret 2015.

Sholeh, "Algoritma Subtitusi Menggunakan Chaesar Cipher," Caesar Cipher Dan Cipher Key, 3 Oktober 2011. [12] K. W. M. R. Puspita, "Analisis Kombinasi Metode Caesar Cipher , Vernam Cipher , Dan Hill Cipher Dalam Proses Kriptografi," Seminar Nasional Teknologi Informasi dan Multimedia 2015, pp. 43-48, 2015.

K. Aulia, "Soal Ujian Sekolah (US) Bahasa Inggris Kelas 6 SD/MI Tahun Ajaran 2017/2018," Juragan Les, 2018. [14] Irawan, A. S. Y., El Ramdhani, A. F., Jordi, M., Mahdi, R. S., & Al Mudzakir, T. (2020). Implementasi Algoritma Advanced Encryption Standard (AES) untuk mengamankan File Video. SYSTEMATICS, 2(1), 28-32.

Hananto, A. L., Solehudin, A., Irawan, A. S. Y., & Priyatna, B. (2019). Analyzing the Kasiski Method Against Vigenere Cipher. arXiv preprint arXiv:1912.04519

Published
2020-07-10
How to Cite
[1]
A. Agung, N. Heryana, and A. Solehudin, “Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security”, bit-cs, vol. 1, no. 2, pp. 42-45, Jul. 2020.