Implementation of the Caesar Chiper Method in Cryptography for Message Data Security
(1) Universitas Negeri Medan
(2) Universitas Negeri Medan
(3) Universitas Negeri Medan
Corresponding Author
Abstract
Data security in the digital era is a very important aspect, especially in maintaining the confidentiality and integrity of information transmitted over the network. One of the classic cryptographic methods that is often used to secure messages is the Caesar Cipher. This method uses a simple substitution technique, where each letter in the message is shifted a certain number of steps in the alphabet. This research discusses the implementation of the Caesar Cipher method as a basic solution for message data security. Although this algorithm is relatively easy to implement and understand, the Caesar Cipher has weaknesses, mainly due to its fixed shifting pattern making it vulnerable to brute force attacks or frequency analysis. Through testing and implementation, this research shows how Caesar Cipher works in the encryption and decryption process, and evaluates its effectiveness in protecting messages from unauthorized access. The results show that this method, although less powerful than modern algorithms, can still be used for certain scenarios that do not require a high level of security. On the other hand, the weaknesses underscore the importance of developing and using more complex cryptographic methods to protect more sensitive information in today's digital era.
Keywords
References
Amalya, Nanda, et al. “Kriptografi Dan Penerapannya Dalam Sistem Keamanan Data.” Jurnal Media Informatika, vol. 4, no. 2, 9 June 2023, pp. 90–93, https://doi.org/10.55338/jumin.v4i2.428. Accessed 12 Oct. 2024.
Aranski, Alvendo Wahyu, et al. “IMPLEMENTASI ALGORITMA CAESAR CIPHER UNTUK KEAMANAN DATA ANGGOTA PERPUSTAKAAN DI UNIVERSITAS XYZ.” JURNAL SITEBA, vol. 2, no. 1, 2023, https://journal.iteba.ac.id/index.php/jurnalsiteba/index.
Febrianingsih, Rindy, and Aliy Hafiz. “IMPLEMENTASI KRIPTOGRAFI BERBASIS CAESAR CHIPER UNTUK KEAMANAN DATA.” Jurnal Informasi Dan Komputer, vol. 7, no. 2, 24 Oct. 2019, pp. 81–86, https://doi.org/10.35959/jik.v7i2.163. Accessed 29 July 2021.
Nasution, Adnan Buyung. “IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER.” JURNAL TEKNOLOGI INFORMASI, vol. 3, no. 1, 20 July 2019, p. 1, https://doi.org/10.36294/jurti.v3i1.680. Accessed 15 Dec. 2019.
Ningsih, Uci Julya, et al. “Pendekripsian Caesar Chiper Dengan Menggunakan TeknikTeknik Kriptanalisis.” Jurnal ILKOMEDIA, vol. 1, no. 1, June 2024, https://doi.org/10.46510/ilkomedia.v1i1.10.
Pratiwi, Radila, et al. “Perancangan Keamanan Data Pesan Dengan Menggunakan Metode Kriptografi Caesar Cipher.” Bulletin of Information Technology, vol. 3, no. 4, 27 Dec. 2022, pp. 367–373, https://doi.org/10.47065/bit.v3i4.420. Accessed 12 June 2024.
Zahwani, Syfa Tasya, and Muhammad Irwan Padli Nasution. “Analisis Kesadaran Masyarakat Terhadap Perlindungan Data Pribadi Di Era Digital.” JoSES: Journal of Sharia Economics Scholar, vol. 2, no. 2, June 2023, pp. 105–109, https://doi.org/10.5281/zenodo.12608751.
Amalia, Rizky, et al. ANALISIS PERFORMA ALGORITMA KRIPTOGRAFI CAESAR CIPHER UNTUK KEAMANAN DATA MENGGUNAKAN PHYTON PADA PUISI “KENANGAN.” 2023.
Purnamasari, Dewi. “IMPLEMENTASI ALGORITMA KRIPTOGRAFI CAESAR CIPHER DAN RAIL FENCE CIPHER UNTUK KEAMANAN DATA TEKS MENGGUNAKAN PYTHON.” Journal of Informatics Education, vol. 4, no. 1, 2021. Accessed 12 Oct. 2024.
Harun Alfirdaus, Mohammad, et al. “Perancangan Aplikasi Enkripsi Deskripsi Mengunakan Metode Caesar Chiper Berbasis Web.” Jurnal Teknik Mesin, Industri, Elektro Dan Informatika (JTMEI), vol. 2, no. 2, 2023, pp. 64–76. Accessed 12 Oct. 2024.
Ziliwu, Krisma Budi. IMPLEMENTASI CAESAR CIPHER PADA ALGORITMA KRIPTOGRAFI KLASIK DALAM PENYANDIAN PESAN. Aug. 2022.
Pratiwi, Radila, et al. “Perancangan Keamanan Data Pesan Dengan Menggunakan Metode Kriptografi Caesar Cipher.” Bulletin of Information Technology (BIT), vol. 3, no. 4, 27 Dec. 2022, pp. 367–373, https://doi.org/10.47065/bit.v3i4.420. Accessed 12 Oct. 2024.
Article Metrics
Abstract View : 38 timesPDF Download : 55 times
DOI: 10.57235/qistina.v3i2.4027
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Muhammad Ferdiansyah Hidayat, Muhammad Ridho, Zulfahmi Indra
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.