Manipulation Vigenere Cipher Algorithm with Vernam Cipher through Matrix Table Rotation
Elwinus Mendrofal, Elwin Yunith Purba, Boy Yako Siahaan, Rahmad W. Sembiring
2018
Abstract
Delivery of data is done by online are particularly vulnerable to be hacked by the owner of interests. The combination of Vernam Cipher and One Time Pad and its manipulation expected to be able to prevent hacking of data. Vernam cipher method works with plaintext is combined with streamkey (randompseudo) of the same length to produce a temporary ciphertext, One Time Pad method works by giving special conditions on the key used which is made of characters or letters are random (random keys or pad), and its randomization is not using a specific formula. One Time Pad encryption method is obtained by adding or subtracting the original text of the key. The combination and manipulation of these two algorithms were able to secure the data and returns back to its original form (plaintext), so it does not cause the integrity of the data is missin
DownloadPaper Citation
in Harvard Style
Mendrofal E., Purba E., Siahaan B. and Sembiring R. (2018). Manipulation Vigenere Cipher Algorithm with Vernam Cipher through Matrix Table Rotation. In Proceedings of the 3rd International Conference of Computer, Environment, Agriculture, Social Science, Health Science, Engineering and Technology - Volume 1: ICEST, ISBN 978-989-758-496-1, pages 179-186. DOI: 10.5220/0010040201790186
in Bibtex Style
@conference{icest18,
author={Elwinus Mendrofal and Elwin Yunith Purba and Boy Yako Siahaan and Rahmad W. Sembiring},
title={Manipulation Vigenere Cipher Algorithm with Vernam Cipher through Matrix Table Rotation},
booktitle={Proceedings of the 3rd International Conference of Computer, Environment, Agriculture, Social Science, Health Science, Engineering and Technology - Volume 1: ICEST,},
year={2018},
pages={179-186},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010040201790186},
isbn={978-989-758-496-1},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 3rd International Conference of Computer, Environment, Agriculture, Social Science, Health Science, Engineering and Technology - Volume 1: ICEST,
TI - Manipulation Vigenere Cipher Algorithm with Vernam Cipher through Matrix Table Rotation
SN - 978-989-758-496-1
AU - Mendrofal E.
AU - Purba E.
AU - Siahaan B.
AU - Sembiring R.
PY - 2018
SP - 179
EP - 186
DO - 10.5220/0010040201790186