Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish
DOI:
https://doi.org/10.32734/jocai.v4.i2-4004Keywords:
caesar, cipher, hill cipher, blowfish, twofish, caesar cipherAbstract
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.
Downloads
References
J. Jumrin, S. Sutardi, and S. Subardin, “Aplikasi Sistem Keamanan Basis Data dengan Teknik Kriptografi RC4 Stream Cipher,” semanTIK, vol. 2, no. 1.
S. Sitinjak, Y. Fauziah, and J. Juwairiah, “Aplikasi Kriptografi File Menggunakan Algoritma Blowfish,” in Seminar Nasional Informatika (SEMNASIF), 2015, vol. 1, no. 3.
S. Althaf, “Implementasi Keamanan Data Menggunakan Algoritma Blowfish Pada Sistem Informasi Koperasi Rias,” Simetris J. Tek. Mesin, Elektro dan Ilmu Komput., vol. 8, no. 1, pp. 251–264, 2017.
E. D. Santosa, “Implementasi Algoritma Caesar Cipher dan Hill Cipher Pada Database Sistem Inventori TB Mita Jepara,” Dok. Karya Ilm. Progr. Stud. Tek. Inform. Univ. Dian Nuswantoro. Semarang, 2015.
A. Randy, “Studi dan Perbandingan Algoritma Blowfish dan Twofish.” 2008.
Published
How to Cite
Issue
Section
Copyright (c) 2020 Data Science: Journal of Computing and Applied Informatics
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Data Science: Journal of Informatics Technology and Computer Science (JoCAI) and Faculty of Computer Science and Information Technology as well as TALENTA Publisher Universitas Sumatera Utara as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, will be allowed only with a written permission fromData Science: Journal of Informatics Technology and Computer Science (JoCAI).
The Copyright Transfer Form can be downloaded here.
The copyright form should be signed originally and sent to the Editorial Office in the form of original mail or scanned document.