M Ziaurrahman, Ema Utami, Ferry Wahyu Wibowo


The development of communication is increasingly rapid which does not escape from various threats such as eavesdropping or data theft, because that security aspect of data security is now very calculated. Various ways have been done to secure data that contains confidential information. One method used is to scramble the data into unclear content, so that when tapped it will be difficult to find out the actual information content. Encryption techniques by changing and randomizing the original form of data are called cryptography. Vigenere cipher is one type of classical cryptography algorithm that is popular and often used. This Vigenere cipher uses a substitution technique in encrypting the message where each plaintext character in the message will be encrypted into another character in the ciphertext based on the key used. One Pad algorithm is one algorithm that has perfection when encrypting and decrypting it. The basic concept of the One Time Pad algorithm is almost the same as the Vigenere algorithm, except that in this algorithm the key is generated randomly. In this paper, we will explain how to strengthen Vigenere cipher by modifying Vigenere ciphers. Modifications are carried out by applying One Time Pad encryption generated from the key and the next key generation technique using Vigenere encryption continues so that the key used for the coding will be different from the key used previously. With the use of this method, the connection between plaintext and ciphertext will become less and more difficult to solve cryptanalis.

Keywords: Cryptography, Modification, Vigenere Cipher, One Time Pad, and Cyber Security.

Teks Lengkap:



Monkhouse, H. Duncan. (2011). Repost on Cyber Crime Investigation. HTCIA.Inc.

Simarmata, Janner. 2006. Pengenalan Teknologi dan Informasi. Yogyakarta: Andi.

Atika Sari, Christy., Hari Rachmawanto, Eko. 2014. Gabungan Algoritma Vernam Cipher dan End Of File untuk Keamanan Data. Jurnal. Techno.Com, Vol.13, No.3, Agustus 2014 : 150-157.

Paar, Christof., Pelzi, Jan., dan Preneel, Bart.2010. Understanding Cryptography. Springer.

Sadikin, Rifki. 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Penerbit Andi, Yogyakarta.

Prayudi, Yudi, Idham Halik. 2005. Studi Analisis Algoritma Rivest Code 6 (RC6) Dalam Enkripsi/Dekripsi Data. Seminar Nasional Aplikasi Teknologi Informasi 2005 (SNATI 2005), Yogyakarta.

Kahn, D. (1996). The Codebreakers: The comprehensive history of secret communication from ancient times to the internet. Simon and Schuster.

Wirdasari, Dian. 2008. Prinsip Kerja Kriptografi dalam Mengamankan Informasi, Jurnal SAINTIKOM Vol.5 No.2.

Diffie, Whitfield, Martin E Hellman. 1976. New Directions in Cryptography. IEEE Trans. Info. Theory IT-22.

William Stalling, 2003, Cryptography and Network Security, Principle and Practice 3 rd Edition, Pearson Education, Inc.

Deng, F. G., & Long, G. L. (2004). Secure direct communication with a quantum one-time pad. Physical Review A, 69(5), 052319.

Rubin, F. (1996). One-time pad cryptography. Cryptologia, 20(4), 359-364.

Andhika, Fatardhi Rizky. 2011. Modifikasi Vigenere Cipher dengan Menggunakan Caesar Cipher dan Enkripsi Berlanjut untuk Pembentukan Key-nya. Bandung. ITB.


  • Saat ini tidak ada refbacks.

Program Studi Teknik Informatika Unversitas Janabadra