File Cryptography Optimization Based on Vigenere Cipher and Advanced Encryption Standard (AES)
DOI:
https://doi.org/10.33633/jais.v8i2.7899Abstract
The rapid The main problem in the misuse of data used in crime is the result of a lack of file security. This study proposes a data security method to protect document files using the Advanced Encryption Standard (AES) algorithm combined with the Vigenere Cipher. This research carried out 2 processes, namely the encryption process and the decryption process. The encryption process will be carried out by the AES algorithm and then encrypted again with the Vigenere Cipher algorithm. The experiments show that the proposed method can encrypt files properly, where there are changes in the value of the document file and the encrypted file cannot be opened and the description results do not cause changes to the original file. The results of this study are that the system is able to work properly so as to produce file encryption and decryption using the AES method combined with the Vigenere Cipher. In document files, the largest difference in encryption and decryption time is 8 seconds, while in image files the difference in encryption and decryption time is 17 seconds. This longest time difference is generated by large files.References
J. P. Sermeno, K. A. S. Secugal, and N. E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” International Journal of Applied Science and Engineering, vol. 18, no. 4(Special Issue), pp. 1–10, 2021, doi: 10.6703/IJASE.202106_18(4).003.
O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput Sci, vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.
K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” Journal of Applied Intelligent System, vol. 3, no. 1, pp. 28–38, 2018.
K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 8, pp. 2341–2352, Nov. 2022, doi: 10.1080/09720529.2020.1838744.
D. Suprihant et al., “Combination Vigenere Cipher and One Time Pad for Data Security,” International Journal of Engineering & Technology, vol. 7, no. 2, pp. 92–94, 2018.
A. Susanto, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, R. R. Ali, and I. U. Wahyu Mulyono, “Dual Security Method for Digital Image using HBV Encryption and Least Significant Bit Steganography,” in Journal of Physics: Conference Series, May 2019, vol. 1201, no. 1. doi: 10.1088/1742-6596/1201/1/012024.
C. A. Sari, G. Ardiansyah, D. R. I. Moses Setiadi, and E. H. Rachmawanto, “An improved security and message capacity using AES and Huffman coding on image steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 5, pp. 2400–2409, 2019, doi: 10.12928/TELKOMNIKA.v17i5.9570.
S. L. Chikouche and N. Chikouche, “An improved approach for lsb-based image steganography using AES algorithm,” in 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B), Oct. 2017, pp. 1–6. doi: 10.1109/ICEE-B.2017.8192077.
E. H. Rachmawanto, K. Prasetyo, C. A. Sari, I. M. S. De Rosal, and N. Rijati, “Secured PVD Video Steganography Method based on AES and Linear Congruential Generator,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Nov. 2018, pp. 163–167. doi: 10.1109/ISRITI.2018.8864466.
F. Mushtaq Sher Ali and F. Hassan Sarhan, “Enhancing Security of Vigenere Cipher by Stream Cipher,” Int J Comput Appl, vol. 100, no. 1, pp. 975–8887, 2014.
N. Laila and A. S. Rms, “IMPLEMENTASI STEGANOGRAFI LSB DENGAN ENKRIPSI VIGENERE CIPHER PADA CITRA,” Computer Science Informatics Journal, vol. 1, no. 2, 2018.
B. B. Ahamed and M. Krishnamoorthy, “SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm,” Journal of the Operations Research Society of China, Aug. 2020, doi: 10.1007/s40305-020-00320-x.
E. Irfan Riaz Shohab Sandhu et al., “An Enhanced Vigenere Cipher For Data Security,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 5, no. 03, 2016, [Online]. Available: www.ijstr.org
L. Budi Handoko, “SEKURITI TEKS MENGGUNAKAN VIGENERE CIPHER DAN HILL CIPHER,” Bit (Fakultas Teknologi Informasi Universitas Budi Luhur), vol. 19, no. 1, pp. 37–47, 2022.
D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, “An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher,” in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), May 2018, pp. 1–9. doi: 10.1109/ICOEI.2018.8553910.
E. Rahmawan Pramudya and L. Budi Handoko, “KRIPTOGRAFI VIGENERE UNTUK MENGAMANKAN PESAN TEKS BERBASIS OCR (OPTICAL CHARACTER RECOGNITION),” in Proceeding SENDIU, 2021, pp. 460–467.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).