2.1.1 Cryptography Components
Basically, the cryptographic component consists of
several components, such as:
1. Encryption: is very important in cryptography, is
a way of securing the transmitted data that are
kept confidential. The original message is called
plaintext, which is converted into code that is not
understood. Encryption can be interpreted with a
cypher or code. Similarly, do not understand a
word then we will see it in a dictionary or
glossary. Unlike the case with encryption, to
convert plain text into text-code we use
algorithms to encode the data that we want.
2. Decryption: is the opposite of encryption. The
encrypted message is returned to the original form
(original text), called the message encryption
algorithm used for encryption is different from the
algorithm used for encryption.
3. Keywords: that means here is the key used for
encryption and description.
Security of cryptographic algorithms depending
on how the algorithm works, therefore this kind of
algorithm is called finite algorithm. Limited
algorithm is an algorithm used a group of people to
keep the messages they send.
2.2 Vigenere Chiper
The Vigenère cipher is a method of encrypting
alphabetic text by using a series of different Caesar
ciphers based on the letters of a keyword. It is a
simple form of polyalphabetic substitution. The
characters used in the Cipher Vigenere that is A, B,
C, ..., Z and united with the numbers 0, 1, 2, ..., 25.
The encryption process is done by writing the key
repeatedly. Writing the key repeatedly performed
until each character in messages have a couple of key
characters. Furthermore, the characters in the
message is encrypted using the Caesar Cipher key
values that have been paired with numbers. The
Confederacy's messages were far from secret and the
Union regularly cracked their messages. Throughout
the war, the Confederate leadership primarily relied
upon three key phrases, "Manchester Bluff",
"Complete Victory" and, as the war came to a close,
"Come Retribution". The table below show the
example of encription using Vigenere Chiper consist
of Plaintext, Key and Chipertext.
Figure 1 Examples Using Encryption Vigenere Cipher
(Bruen, 2005)
Examples of encryption in Figure 1, the message
character "E" is encrypted with a key "M" and
generate cipher text "R". The results obtained from
the code encrypting the message "E" is worth 5 and a
key character "M" which is worth 13. Each character
value added 5 + 13 = 18. Because 18 is less than the
26 which is the number of characters used, then 18
divided by 26. The rest of the division is 18 which is
a character "R". The encryption process can be
calculated by the following equation (Stalling, 2011):
𝐸𝑖=(𝑃𝑖+𝐾𝑖) 𝑚𝑜𝑑 26 (2.0)
Where 𝐸𝑖, 𝑃𝑖 and 𝐾𝑖 an encrypted character, the
character of the message and the character key. While
the decryption process can use the following
equation:
𝐷𝑖=(𝐶𝑖−𝐾𝑖) 𝑚𝑜𝑑 26 (2.1)
With 𝐷𝑖 is the result of the decryption code, 𝐶𝑖 is
character cipher text or cipher, 𝐾𝑖 is a key character.
While other methods to perform the encryption
process with Vigenere Cipher method that uses tabula
recta (also called Vigenere square).
Figure 2: Tabula recta Vigenere algorithm
The leftmost column of squares states key letters,
while the top line states plaintext letters. Each line
in the rectangle states the letters ciphertext obtained
by Caesar Cipher, in which the number of shifts letter
plaintext specified numerical values of letters that key
(ie, a = 0, b = 1, c = 2, ..., z = 25) ,Vigenère square is
used to obtain the ciphertext by using a key that has
been determined. If the key length is shorter than the
length of the plaintext, then the keyare repeatedit’s