Analisa Algoritma Ciphers Transposition: Study Literature
Abstract
Technological developments allow the sending and storage of data can be done quickly, easily, practically, and safely. One security used uses cryptographic techniques. Cryptography is a technique of converting original text (plaintext) into secret text (ciphertext) using cryptographic algorithms (ciphers) or what is called the encryption process. The decryption process is the process of converting data encoded into original data. One of the cryptographic algorithms is the Cipher Transposition Algorithm. The analysis aims to determine the characteristics and application of the Transposition Cipher. The method used in this study by means of Study Literature, analyzes previous research from journals related to the Transposition Cipher Algorithm. The results are in the form of a view using the study literature method and knowing the characteristics and application of the Cipher Transposition algorithm and analyzing trends in previous studies.
Â
Kata Kunci : Cryptography, Algorithms, Cipher Transposition, Study literature
References
Lengths Using an Improved Genetic Algorithm. World Applied Sciences Journal
Toemeh, R., Arumugam, S. 2007. Breaking Transposition Cipher with Genetic Algorithm. Electronics And Electrical Engineering
Mishra, A. 2013. Enhancing Security Of Caesar Cipher Using Different Methods. International Journal of Research in Engineering and Technology. Vol 02. Issue 09. Pp 327-332
Shukla, S., Verma, P.K. 2014. Implementation of Affine Substitution Cipher With Keyed Transposition Cipher for Enhancing Data Security. International Journal of Advanced Research in Computer Science and Software Engineering. Vol 4. Issue 1
Shrivastava, G., Sharma, R., Chouhan, M. 2013. Using Letters Frequency Analysis in Caesar Cipher With Double Columnar Transposition Technique. International Journal Of Engineering Sciences & Research Technology
Garg, P. 2009. Genetic Algorithms, Tabu Search And Simulated Anneling : A Comparison Between Three Approaches For The Cryptanalysis Of Transposition Cipher. Journal of Theoretical and Applied Information Technology
Benjamin, O., Garba, E.J.D. 2015. Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error. British Journal of Mathematics & Computer Science
Pohan, R.Y. 2007. Studi dan Perbadingan Berbagai Macam Algoritma Cipher Transposisi. Teknik Informatika : ITB
Dar, J.A. 2014. Enhancing The Data Security Of Simple Columnar Transposition Cipher By Caesar Cipher And Rail Fence Cipher Technique.
Sokouti, M., Sokouti, B., Pashazadeh, S. 2009. An Approach in Improving Transposition Cipher System. Indian Journal of Science and Technology
Quist., Kester, A. 2013. A Hybrid Cryptosystem Based On Vigenere Cipher And Columnar Transposition Cipher. International Journal Of Advanced Technology & Engineering Research (IJATER)
Russell, M.D., Clark, J.A., Steoney, S. [n.d]. Making the Most of Two Heuristics: Breaking Transposition Cipher with Ants.
Gupta, D.K., Srivastava, S.K., Singh, V. 2012. New Concept Of Symmetric Encryption Algorithm A Hybrid Approach Of Caesar Cipher And Columnar Transportation In Multi Stages. Journal of Global Research in Computer Science. Vol 3. Issue 1. January
Kumar, R. 2014. Integration Of Caesar Cipher with Redefence cipher Enhancing Data Security.International Journal for Scientific Research & Development. Vol 2. Issue 05
Sugumar, R., S, Tamulahenthi., Gurnathan, M. 2012. Review of Effective Data Encrystion and Decryption Technique
Annalakshmi, Mu. Padmapriya, A. 2012. Zigzag Ciphers : A Novel Transposition Method. International Conference on Computing and Information.
Christensen, C. 2006. Transposition Ciphers.http://www.nku.edu/, diakses pada 31 Agustus 2018
Bhowmick, A., Geetha, M. 2015. Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition, International Journal of Computer Sciences and Engineering. Vol. 03.Issue 02. Pp 20-27
Bhowmick, A., Lal, A.V., Ranjan, Nitish. 2015. International Journal Engineenering Research & Technology(IJERT). VOl 4. Issue 07. Pp 1001-1014.