Full Text

Turn on search term navigation

© 2024. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

To hide confidential messages from people who are not responsible or who can access the messages, a way is needed to hide the messages. One way to hide messages in transmission is to change the data into something unintelligible by encoding and embedding it using cryptography and steganography techniques. This application was built using the hill cipher algorithm and the Rivest Cipher 4 (RC4) method. This algorithm is a symmetric key algorithm which has several advantages in data encryption. The hill chiper algorithm uses a mxm matrix as the encryption and decryption key. Meanwhile, the RC4 symmetric key is in the form of a stream cipher which can process input data as well as messages or information. Input data is generally in the form of bytes or even bits. The results of this research show that hill cipher and RC4 have their respective advantages and disadvantages. However, currently, RC4 is generally considered less safe for use in security-critical scenarios due to its vulnerability to attack. It is highly recommended to use an encryption algorithm such as advanced encryption standard (AES) which is modern and strong and has been tested and proven to be more resilient.

Details

Title
A combination of hill cipher and RC4 methods for text security
Author
Azanuddin 1 ; Kartadie, Rikie 2 ; Erwis, Fauzi 3 ; Boy, Ahmad Fitri 4 ; Nasyuha, Asyahri Hadi 5 

 Department of Computer Engineering, Faculty of Computer Engineering and Informatics, Politeknik Negeri Medan, Medan, Indonesia 
 Department of Computer Engineering, Faculty of Information Technology, Universitas Teknologi Digital Indonesia, Yogyakarta, Indonesia 
 Department of Information Technology Education, Faculty of Education, Universitas Rokania, Riau, Indonesia 
 Department of Information System, Faculty of Information System, STMIK Triguna Dharma, Medan, Indonesia 
 Departmen of Information of System, Faculty of Information Technology, Universitas Teknologi Digital Indonesia, Yogyakarta, Indonesia 
Pages
351-361
Publication year
2024
Publication date
Apr 2024
Publisher
Ahmad Dahlan University
ISSN
16936930
e-ISSN
23029293
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3048489663
Copyright
© 2024. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.