Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

Authors

  • Wasis Haryono Universitas Pamulang

DOI:

https://doi.org/10.32734/jocai.v4.i2-4004

Keywords:

caesar, cipher, hill cipher, blowfish, twofish, caesar cipher

Abstract

Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.

Downloads

Download data is not yet available.

References

J. Jumrin, S. Sutardi, and S. Subardin, “Aplikasi Sistem Keamanan Basis Data dengan Teknik Kriptografi RC4 Stream Cipher,” semanTIK, vol. 2, no. 1.

S. Sitinjak, Y. Fauziah, and J. Juwairiah, “Aplikasi Kriptografi File Menggunakan Algoritma Blowfish,” in Seminar Nasional Informatika (SEMNASIF), 2015, vol. 1, no. 3.

S. Althaf, “Implementasi Keamanan Data Menggunakan Algoritma Blowfish Pada Sistem Informasi Koperasi Rias,” Simetris J. Tek. Mesin, Elektro dan Ilmu Komput., vol. 8, no. 1, pp. 251–264, 2017.

E. D. Santosa, “Implementasi Algoritma Caesar Cipher dan Hill Cipher Pada Database Sistem Inventori TB Mita Jepara,” Dok. Karya Ilm. Progr. Stud. Tek. Inform. Univ. Dian Nuswantoro. Semarang, 2015.

A. Randy, “Studi dan Perbandingan Algoritma Blowfish dan Twofish.” 2008.

Published

2020-07-31

How to Cite

Haryono, W. (2020). Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish. Data Science: Journal of Computing and Applied Informatics, 4(2), 100-110. https://doi.org/10.32734/jocai.v4.i2-4004