Application of Integers in Vernam Cipher Cryptography (One Time Pad)

  • Parasian D.P Silitonga Faculty of Computer Science, Informatics Engineering Study Program, Universitas Katolik Santo Thomas, Medan, Indonesia
  • Sorang Pakpahan Faculty of Computer Science, Information Systems Study Program, Universitas Katolik Santo Thomas, Medan, Indonesia
Keywords: Cryptography, encryption, decryption, one time pad

Abstract

Today, the effective security of a system is indispensable for daily business activities. A secure system can provide a high level of trust to users so that it can add value and usability to the system itself. Users will feel comfortable and safe when dealing with systems that can secure user data from attackers. There are several ways to secure data through a channel, one of which is cryptography. In cryptography, highly confidential data will be disguised in such a way that even if the data can be read it cannot be understood by unauthorized parties. Data that will be sent and has not been encrypted is known as plaintext, and after being disguised by an encoding method, this plaintext will turn into ciphertext.

Downloads

Download data is not yet available.

References

[1] H. Mukthar, Kriptografi untuk Keamanan Data. 2018.
[2] R. Watrianthos, “PERBANDINGAN TEKNIK KRIPTOGRAFI METODE SAPPHIRE II DAN RC4,” J. Inform., 2019, doi: 10.36987/informatika.v3i2.213.
[3] R. Munir, “Kriptografi,” in 2, 2019.
[4] W. Pramusinto, N. Wizaksono, A. Saputro, J. C. Raya, P. Utara, and K. Lama, “Aplikasi Pengamanan File Dengan Metode Kriptografi AES 192, RC4 Dan Metode Kompresi Huffman,” Vol ., 2019.
[5] E. Rahmawan Pramudya, Abudussalam, and D. R. I. M. Setiadi, “Enkripsi Gambar Grayscale Menggunakan Kriptografi Rivest Cipher (RC) 4,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim 69, 2018.
[6] A. A. Fikhri and H. Hendrawaty, “Implementasi Steganografi Text To Image Menggunakan Metode One Bit Least Significant Bit Berbasis Android,” J. Infomedia, vol. 3, no. 1, pp. 10–17, 2018, doi: 10.30811/jim.v3i1.623.
[7] M. K. Harahap, “ANALISIS PERBANDINGAN ALGORITMA KRIPTOGRAFI KLASIK VIGENERE CIPHER DAN ONE TIME PAD,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), 2016, doi: 10.30743/infotekjar.v1i1.43.
[8] D. Rizal, T. Sutojo, and Y. Rahayu, “Implementasi Kriptografi Gambar Menggunakan Kombinasi Algoritma Elgamal Dan Mode Operasi Ecb (Electronic Code Book),” Techno.COM, 2016.
[9] N. M. D. Oktafiansyah, F. Agus, and S. Maharani, “Penerapan Kriptografi Dengan Algoritma Data Encryption Standart Pada Text Hasil Konversi Dari Citra,” Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 1, no. 1, pp. 85–89, 2016.
[10] D. Adhar, “Implementasi Algoritma Des (Data Encryption Standard) Pada Enkripsi Dan Deskripsi Sms Berbasis Android,” J. Tek. Inform. Kaputama, vol. 3, no. 2, pp. 53–60, 2019, [Online]. Available: https://jurnal.kaputama.ac.id/index.php/JTIK/article/view/185.
[11] S. Wardoyo and R. Fahrizal, “Aplikasi Teknik Enkripsi Dan Dekripsi File Dengan Algoritma Blowfish Pada Perangkat Mobile Berbasis Android,” Setrum Sist. Kendali-Tenaga-elektronika-telekomunikasi-komputer, vol. 3, no. 1, p. 43, 2016, doi: 10.36055/setrum.v3i1.497.
Published
2021-06-30
How to Cite
Silitonga, P. D., & Sorang Pakpahan. (2021). Application of Integers in Vernam Cipher Cryptography (One Time Pad). INFOKUM, 9(2, June), 350-353. Retrieved from https://infor.seaninstitute.org/index.php/infokum/article/view/135