Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

Authors

  • Wasis Haryono Universitas Pamulang

DOI:

https://doi.org/10.32734/jocai.v4.i2-4004

Keywords:

Caesar Cipher, Hill Cipher, Blowfish, Twofish

Abstract

Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.

Downloads

Download data is not yet available.

References

Jumrin (2016),APLIKASI SISTEM KEAMANAN BASIS DATA DENGAN TEKNIK KRIPTOGRAFI RC4 STREAM CIPHER, Jurusan Teknik Informatika, Fakultas Teknik, Universitas Halu Oleo, Kendari.

Suriski Sitinjak (2010), APLIKASI KRIPTOGRAFI FILE MENGGUNAKAN ALGORITMA BLOWFISH, Jurusan Teknik Informatika UPN "Veteran" Yogyakarta.

Susanto (2017), IMPLEMENTASI KEAMANAN DATA MENGGUNAKAN ALGORITMA BLOWFISH PADA SISTEM INFORMASI KOPERASI RIAS, Program Studi Teknik Informatika STMIK MUSIRAWAS. 51-64

Egar Dika Santosa. 2015.,IMPLEMENTASI ALGORITMA CAESAR CIPHER DAN HILL CIPHER PADA DATABASE SISTEM INVENTORI TB MITA JEPARA, Program Studi Teknik Informatika - S1, Fakultas Ilmu Komputer, Universitas Dian Nuswantoro.

Adhitya Randy.2015. STUDI DAN PERBANDINGAN ALGORITMA BLOWFISH DAN TWOFISH, Jurusan Teknik Informatika, Institut Teknologi Bandung.

Published

2020-07-31

How to Cite

Haryono, W. (2020). Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish. Data Science: Journal of Computing and Applied Informatics, 4(2). https://doi.org/10.32734/jocai.v4.i2-4004