Implementasi ROT13 sebagai Algoritma Enkripsi Sederhana dalam Python untuk Keamanan Komunikasi Digital
DOI:
https://doi.org/10.57235/jalakotek.v2i1.4030Keywords:
Caesar Cypher, ROT13, Python, KriptografiAbstract
Penelitian ini mengkaji implementasi algoritma enkripsi Caesar Cipher dengan pergeseran 13 huruf, atau ROT13, menggunakan Python. ROT13 berfungsi sebagai mekanisme enkripsi sederhana yang memutar setiap huruf dalam teks input sebanyak 13 posisi dalam alfabet, sehingga menghasilkan teks yang tidak dapat dengan mudah dipahami. Penelitian ini merinci langkah-langkah implementasi, disertai dengan kode dan contoh hasil enkripsi serta dekripsi. Analisis menunjukkan bahwa ROT13 merupakan metode yang efektif dan mudah diterapkan untuk meningkatkan keamanan komunikasi digital dalam konteks yang tidak terlalu sensitif.
Downloads
References
Ryan Ercel Paderes. “Cross-Crypto Algorithm: Leveraging the Features of the ROT13 and Vigenere Ciphers.” Journal of Innovative Technology Convergence, vol. 3, no. 1, 30 June 2021, pp. 35–42, https://doi.org/10.69478/jitc2021v3n1a04. Accessed 12 Oct. 2024.
Putri, Ayu Devia, et al. “Application of Super Encryption Using Rot 13 Algorithm Method and Algorithm Beaufort Cipher for Image Security Digital.” Journal of Artificial Intelligence and Engineering Applications, vol. 3, no. 1, 5 Oct. 2023, pp. 83–92, https://doi.org/10.59934/jaiea.v3i1.263. Accessed 8 May 2024.
Zakiyah, Rizkiyatul, et al. “IMPLEMENTASI ROT 13 DAN VIGENERE CIPHER UNTUK PENGAMANAN PESAN BERBASIS WEB.” ADIJAYA - Jurnal Multidisiplin, vol. 1, no. 2, 2023, pp. 423–430.
Milian, Yanuar Chris, and Wiwin Sulistyo. “Model Pengembangan Keamanan Data Dengan Algoritma ROT 13 Extended Vernam Cipher Dan Stream Cipher.” Jurnal JTIK (Jurnal Teknologi Informasi Dan Komunikasi), vol. 7, no. 2, 1 Apr. 2023, pp. 208–216, https://doi.org/10.35870/jtik.v7i2.716. Accessed 2 May 2024.
Aresta, Redho Maland, et al. “IMPLEMENTASI MULTI ENKRIPSI ROT 13 PADA SYMBOL WHATSAPP.” Journal of Information System Management (JOISM), vol. 2, no. 1, 4 July 2020, pp. 1–5, https://doi.org/10.24076/joism.2020v2i1.158. Accessed 2 Mar. 2023.
Fajri, G. R., Sembiring, E. H., & Hasan, M. A. (2020). Keamanan Data Pada Pengarsipan Surat Menggunakan Metode Kriptografi Klasik Vigenere Cipher Dan Shift Cipher.ZONAsi: Jurnal Sistem Informasi,2(1), 61-72.
Hendrik. “Kombinasi Algoritma Huffman Dan Algoritma ROT 13 Dalam Pengamanan File Docx.” Journal of Information System Research (JOSH), vol. 2, no. 1, 25 Oct. 2020, pp. 40–46. Accessed 11 Oct. 2024.
Risman. “Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at P.T. Samudera Indonesia.” International Journal of Basic and Applied Science, vol. 10, no. 3, 30 Dec. 2021, pp. 100–107, https://doi.org/10.35335/ijobas.v10i3.61. Accessed 6 Feb. 2022.
Manullang, A.S., Puspasari, R. and Verina, W., 2020. Penyandian Database Menggunakan Metode Base64 Dan Rot13. Jurnal Mahasiswa Fakultas Teknik dan Ilmu Komputer, 1(1), pp.283- 292.
Siahaan, K.N. and Mesran, M., 2020. Penerapan Algoritma Venigmare Cipher dan Vernam Cipher Dalam Pengamanan Data Teks. Jurnal Sistem Komputer dan Informatika (JSON), 2(1), pp.48-52. DOI: 10.30865/json.v2i1.2457.
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
- Authors certify that the work reported here has not been published before and contains no materials the publication of which would violate any copyright or other personal or proprietary right of any person or entity.
- Authors dont transfer or license the copyright of publishing to Jalakotek: Journal of Accounting Law Communication and Technology Research to publish the article in any media format, to share, to disseminate, to index, and to maximize the impact of the article in any databases.
- Authors hereby dont agree to transfer a copyright for publishing to Jalakotek: Journal of Accounting Law Communication and Technology a Publisher of the manuscript.
- Authors reserve the following:
- all proprietary rights other than copyright such as patent rights;
- the right to use all or part of this article in future works of our own such as in books and lectures;
- use for presentation in a meeting or conference and distributing copies to attendees;
- use for internal training by author's company;
- distribution to colleagues for their research use;
- use in a subsequent compilation of the author's works;
- inclusion in a thesis or dissertation;
- reuse of portions or extracts from the article in other works (with full acknowledgement of final article);
- preparation of derivative works (other than commercial purposes) (with full acknowledgement of final article); and
- voluntary posting on open web sites operated by author or author’s institution for scholarly purposes, but it should follow the open access license of Creative Common CC BY-NC License.










