Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512

  • Imam Riadi
  • Abdul Fadlil
  • Fahmi Auliya Tsani Universitas Ahmad Dahlan

Abstract

One of the popular cryptographic algorithms is the Vigenère Cipher. This algorithm is included in classical cryptographic algorithms, so its capabilities are limited to text-type data. Through this research, this research try to modify the Vigenère Cipher so that it can be used on digital image media. The improvement is performed using ASCII code as a Vigenère table and the key generated by the SHA512 hash technique with salt. The encryption and decryption process was carried out on ten jpg and ten png files and showed a 100% success rate. Speed and memory consumption tests on the encryption process by comparing it with the AES algorithm show that AES excels in speed with 409,467 Mb/s while Vigenère wins in memory consumption by utilizing only 5,0007 Kb for every Kilobytes of the processed digital image file.


 

Downloads

Download data is not yet available.

References

[1] I. Riadi, R. Umar, and I. M. Nasrulloh, "Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods," Lontar Komputer, vol. 9, no. 3, pp. 169–181, 2018.
[2] M. Awad, M. Ali, M. Takruri, and S. Ismail, "Security Vulnerabilities Related to Web-based Data," Telkomnika (Telecommunication, Computing, Electronics and Control), vol. 17, no. 2, pp. 852–856, 2019.
[3] R. Munir, Kriptografi. Bandung: Informatika, 2006.
[4] Hermansa, R. Umar, and A. Yudhana, “Analisis Sistem Keamanan Teknik Kriptografi dan Steganografi Pada Citra Digital (Bitmap),” in Seminar Nasional Teknologi Fakultas Teknik Universitas Krisnadwipayana, 2019, pp. 520–528.
[5] A. Fadlil, I. Riadi, and A. Nugrahantoro, "Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology," Lontar Komputer, vol. 11, no. 3, pp. 155–166, 2020.
[6] D. R. I. M. Setiadi, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi (Beaufort Dan Vigenere) pada Citra Digital,” in Seminar Nasional Multi Disiplin Ilmu, 2018, pp. 52–57.
[7] D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher pada Citra Digital,” Dinamika Rekayasa, vol. 14, no. 1, pp. 57–64, 2018.
[8] F. Anwar, E. H. Rachmawanto, C. A. Sari, and D. R. I. M. Setiadi, "StegoCrypt Scheme using LSB-AES Base64," in International Conference on Information and Communications Technology (ICOIACT), 2019, no. July, pp. 85–90.
[9] E. Gunadhi and A. Sudrajat, “Pengamanan Data Rekam Medis Pasien Menggunakan Kriptografi Vigenere Cipher,” Jurnal Algoritma, vol. 13, no. 2, pp. 295–301, 2016.
[10] S. K. Mandal and A. R. Deepti, "A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme," International Journal of Computer Science and Information Technologies, vol. 7, no. 4, pp. 2096–2099, 2016.
[11] A. A. Soofi, I. Riaz, and U. Rasheed, "An Enhanced Vigenere Cipher For Data Security," International Journal of Scientific & Technology Research, vol. 5, no. 03, pp. 141–145, 2016.
[12] S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, "Data Security Using Vigenere Cipher and Goldbach Codes Algorithm," International Journal of Engineering Research & Technology, vol. 6, no. 1, pp. 360–363, 2017.
[13] Rojali, A. G. Salman, and George, "Website-Based PNG Image Steganography Using The Modified Vigenere Cipher, Least Significant Bit, And Dictionary Based Compression Methods," in International Conference on Mathematics: Pure, Applied and Computation, 2016.
[14] I. Saputra, N. A. Hasibuan, M. Aan, and R. Rahim, "Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File," International Journal of Engineering Research & Technology, vol. 6, no. 1, pp. 266–269, 2017.
[15] Rihartanto, R. K. Ningsih, A. F. O. Gaffar, and D. S. B. Utomo, "Implementation of Vigenere Cipher 128 and Square Rotation in Securing Text Messages," Jurnal Teknologi dan Sistem Komputer, vol. 8, no. 3, pp. 201–209, 2020.
[16] A. Fadlil, I. Riadi, and A. Nugrahantoro, “Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi,” Digital Zone: Jurnal Teknologi Informasi dan Komunikasi, vol. 11, no. 1, pp. 81–95, 2020.
[17] P. Hernawandra, S. Supriyadi, and U. T. Lenggana, “Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android,” Jurnal Teknologi dan Sistem Komputer, vol. 6, no. 2, pp. 44–50, 2018.
[18] Y. A. Gerhana, E. Insanudin, U. Syarifudin, and M. R. Zulmi, "Design of Digital Image Application using Vigenere Cipher Algorithm," in International Conference on Cyber and IT Service Management, 2016, pp. 1–5.
[19] A. Subandi, M. S. Lydia, R. W. Sembiring, M. Zarlis, and S. Efendi, "Vigenere Cipher Algorithm Modification by Adopting RC6 Key Expansion and Double Encryption Process," in 2nd Nommensen International Conference on Technology and Engineering, 2018, pp. 1–6.
[20] I. Riadi, A. Fadlil, and F. A. Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022.
[21] T. Zebua and E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 4, no. 4, pp. 275–282, 2017.
[22] M. Panda, "Performance Analysis of Encryption Algorithms for Security," in International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016, pp. 278–284.
[23] Z. El Mrabet, N. Kaabouch, H. El Ghazi, and H. El Ghazi, "Cyber-Security in Smart Grid: Survey and Challenges," Computers and Electrical Engineering, vol. 67, pp. 469–482, 2018.
[24] H. E. Prabowo and A. Hangga, “Enkripsi Data Berupa Teks Menggunakan Metode Modifikasi Vigenere Cipher,” in Seminar Nasional Aplikasi Teknologi Informasi (SNATi), 2015, pp. 1–4.
[25] L. G. R. Semesta and S. Amini, “Implementasi One Time Password Dengan Algoritma Secure Hash Algorithm 512 (SHA-512),” Skanika, vol. 1, no. 3, pp. 1206–1211, 2018.
[26] M. Sumagita and I. Riadi, "Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application," International Journal of Cyber-Security and Digital Forensics, vol. 7, no. 4, pp. 373–381, 2018.
[27] R. Fitriyanto, A. Yudhana, and S. Sunardi, “Manajemen jpeg/exif File Fingerprint dengan Algoritma Brute Force String Matching dan Hash Function SHA256,” Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 5, no. 2, pp. 128–139, 2019.
[28] R. Fitriyanto, A. Yudhana, and S. Sunardi, "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation," Jurnal Online Informatika, vol. 4, no. 1, p. 16, 2019.
[29] S. Zhou, P. He, and N. Kasabov, "A Dynamic DNA Color Image Encryption Method Based on SHA-512," Entropy, vol. 22, no. 1091, pp. 1–23, 2020.
[30] M. A. Helmiawan, D. I. Juna, and B. Ramdhani, “Pengamanan Sistem dan Data E-Voting Berbasis Network,” Internal (Information System Journal), vol. 1, no. 1, pp. 1–10, 2018.
[31] A. Tantoni and M. T. A. Zaen, “Implementasi Double Caesar Cipher Menggunakan ASCII,” Jurnal Informatika dan Rekayasa Elektronik, vol. 1, no. 2, p. 24, 2018.
[32] A. Kushwaha and D. Anil GN, "Securing the Authentication Mechanism for Implementing Secret Password," International Journal of Scientific Research in Computer Science Applications and Management Studies, vol. 7, no. 3, pp. 1–4, 2018.
[33] P. J. F. Bemida, A. M. Sison, and R. P. Medina, "Modified SHA-512 Algorithm for Secured Password Hashing," in Innovations in Power and Advanced Computing Technologies (i-PACT ), 2021, pp. 1–9.
[34] U. Rathod, M. Sonkar, and B. R. Chandavarkar, "An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt," in International Conference on Computing, Communication and Networking Technologies, 2020.
[35] M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, 2019.
[36] N. Anwar, Munawwar, M. Abduh, and N. B. Santosa, “Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 2, no. 3, pp. 783–791, 2018.
Published
2022-08-24
How to Cite
RIADI, Imam; FADLIL, Abdul; TSANI, Fahmi Auliya. Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], v. 13, n. 2, p. 84-95, aug. 2022. ISSN 2541-5832. Available at: <https://ojs.unud.ac.id/index.php/lontar/article/view/87617>. Date accessed: 13 nov. 2024. doi: https://doi.org/10.24843/LKJITI.2022.v13.i02.p02.