ANALISIS KETAHANAN KOMBINASI TEKNIK KRIPTOGRAFI RAIL FENCE DAN VIGENERE CIPHER TERHADAP SERANGAN BRUTE-FORCE MENGGUNAKAN PEMROGRAMAN PYTHON <i>Algorithms, Kriptografi, Rail Fence cipher, Vigenere cipher, Brute-Force<i></i></i>
Isi Artikel Utama
Abstrak
Data is an essential asset that must be protected due to its strategic role in maintaining the continuity of information systems. Therefore, data security becomes a crucial aspect in information management. One of the approaches to ensure data security is through the application of cryptographic techniques. Two commonly used classical cryptographic algorithms are the Rail Fence Cipher and the Vigenere Cipher. However, the use of a single algorithm has weaknesses, as it remains vulnerable to brute-force attacks. This study aims to combine two cryptographic methods, namely the transposition technique (Rail Fence) and the substitution technique (Vigenere), to enhance resistance against brute force attacks. The research employs an experimental method by implementing the combined algorithms using the Python programming language. Testing was conducted on three scenarios: encryption using Rail Fence, Vigenere, and their combination. The results show that the combined algorithm increases key space and produces more complex character distribution patterns, thereby improving security against brute-force attacks.
##plugins.themes.bootstrap3.displayStats.downloads##
Rincian Artikel
Terbitan
Bagian

Artikel ini berlisensi Creative Commons Attribution-NonCommercial 4.0 International License.
Referensi
[1] A. Renaldy et al., “Peran Sistem Informasi dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan,” J. Ilmu Multidisplin, vol. 2, no. 1, pp. 15–22, 2023, doi: 10.38035/jim.v2i1.212.
[2] R. Vansuri et al., “Peran CIA (Confidentiality, Integrity, Availability) Terhadap Manajemen Keamanan Informasi,” J. Ilmu Multidisplin, vol. 2, no. 1, pp. 106 113, 2023, doi: 10.38035/jim.v2i1.234.
[3] K. Gita Segara and M. Irwan Padli Nasution, “Perkembangan Teknologi Informasi di Indonesia: Tantangan dan Peluang,” J. Sains Student Res., vol. 3, no.1, pp. 21–33, 2025, [Online]. Available: https://doi.org/10.61722/jssr.v3i1.3128
[4] Y. Pratama and T. Sutabri, “Analisis Kriptografi Algoritma Blowfish pada Keamanan Data menggunakan Dart,” J. Inform. Terpadu, vol. 9, no. 2, pp. 126 135, 2023, doi:10.54914/jit.v9i2.975.
[5] N. Wulan, H. Harahap, and Y. S. Siregar, “Watermarking Citra Digital DFT Dan Kriptografi Algoritma RSA Pada Sistem Berbasis Web,” Pros. Semin. Nas. Teknol. Inov. dan Kolaborasi Disiplin Ilmu, vol. 1, no. 1, pp. 244–255, 2024.
[6] I. Riandi, A. Fadlil, and F. Auliya Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” J. Inform. Sunan Kalijaga, vol. 7, no. 1, pp. 33–45, 2022.
[7] A. P. U. Siahaan, “Pengamanan Pesan Teks Dengan Teknik Transposisi Karakter,” Escaf, 2023, [Online]. Available: https://semnas.univbinainsan.ac.id/index.php/escaf/article/view/456%0Ahttps://semnas.univbinainsan.ac.id/index.php/escaf/article/download/456/282
[8] N. P. E. Merliana, “Pemanfaatan Teknologi Kriptografi dalam mengatasi kejahatan Cyber,” Satya Dharma J. Ilmu Huk., vol. 3, no. 2, pp. 23–40, 2020, [Online]. Available: https://ejournal.iahntp.ac.id/index.php/satya-dharma/article/view/678
[9] D. A. P. Putri and A. Rachmawati, “Honeypot cowrie implementation to protect ssh protocol in ubuntu server with visualisation using kippo-graph,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 6, pp. 3200–3207, 2019, doi: 10.30534/ijatcse/2019/86862019.
[10] A. Fauzi and S. Syahputra, “A Combination Of A Rail Fence Cipher And Merkle Hellman Algorithm For Digital Image Security,” vol. 2, no. 3.
[11] A. Syarif, “Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA,” J. Teknol. Inf., vol. 4, no. 2, pp. 234–240, 2020, doi: 10.36294/jurti.v4i2.1350.
[12] A. Rachmawati, T. B. Adji, and N. A. Setiawan, “Improved Credit Document
Blockchain System Using EduCTX Platform with Decentralized Storage Filecoin,” Proceeding - Int. Conf. Inf. Technol. Comput. 2023, ICITCOM 2023, pp. 169–174, 2023, doi: 10.1109/ICITCOM60176.2023.10442513.
[13] P. Alifia Rizky and S. Soim, “Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware,” Resistor, vol. 3, no. 1, pp. 71–78, 2024, [Online]. Available: https://s.id/jurnalresistor
[14] Nurdayati dkk, “MODIFIKASI RAIL FENCE TRANSPOSITION CIPHER DENGAN CHESS BOARD PATTERN,” 2021.
[15] N. Syah and E. Ardhianto, “Meningkatkan Keamanan Data menggunakan Super Enkripsi Kombinasi Rail Fence dan Vigenere Autokey,” J. Ilm. Komputasi, vol. 23, no. 3, pp. 293–300, 2024, doi: 10.32409/jikstik.23.3.3612.
[16] S. K. Dewi, “Perbandingan Cryptography Klasik Vigenere Cipher Dengan Cryptography Modern RC4 Dalam Tingkat Keamanan Jaringan Komputer,” JoMMiT J. Multi Media dan IT, vol. 8, no. 2, pp. 130–137, 2024, doi: 10.46961/jommit.v8i2.1302.
[17] V. M. Hidayah, D. I. Mulyana, and Y. Bachtiar, “Algoritma Caesar Cipher atau Vigenere Cipher pada Pengenkripsian Pesan Teks,” vol. 05, no. 03, pp. 8563–8573, 2023.
[18] D. Rachmawati, M. A. Budiman, and A. Yusuf, “Combination of Rail Fence Cipher Algorithm and Least Significant Bit Technique to Secure the Image File,” IOP Conf. Ser. Mater. Sci. Eng., vol. 851, no. 1, 2020, doi: 10.1088/1757-899X/851/1/012069.
[19] A. A. Bitar and D. V. Sujatha, “Merging Vernam Cipher stream and Rail ?Fence Algorithms and How Effective They are on Internet of Things Devices,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 3307, pp. 686–691, 2021, doi: 10.32628/cseit2173149.
[20] F. Adji S, “IMPLEMENTASI ALGORITMA ONE TIME PAD CIPHER DAN
TRANSFORMASI RAIL FENCE CIPHER PADA PESAN TEKS,” 2020.
[21] Jamaludin and Romindo, “Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security,” Int. J. Inf. Syst. Technol. Akreditasi, vol. 4, no. 1, pp. 471–481, 2020.
[22] S. Vatshayan, R. A. Haidri, and J. K. Verma, “Design of Hybrid Cryptography System based on Vigenere Cipher and Polybius Cipher,” 2020 Int. Conf. Comput. Perform. Eval. ComPE 2020, pp. 848–852, 2020, doi: 10.1109/ComPE49325.2020.9199997.
[23] M. H. Maulana, “Python Bahasa Pemograman Yang Ramah Bagi Pemula,” JISCO Journal Inf. Syst. Comput., vol. 2, pp. 73–78, 2024.