Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher

  • Milian Y
  • Sulistyo W
N/ACitations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plaintext using ROT13, followed by encrypting the result using Vernam Cipher with an inputted key, and then encrypting the output again using Stream Cipher. The advantages of this combination model include enhanced data security, as demonstrated by the three-stage encryption and decryption process.

Cite

CITATION STYLE

APA

Milian, Y. C., & Sulistyo, W. (2023). Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher. Jurnal JTIK (Jurnal Teknologi Informasi Dan Komunikasi), 7(2), 208–216. https://doi.org/10.35870/jtik.v7i2.716

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free