Analisa Algoritma Ciphers Transposition: Study Literature

Authors

  • Juwita Artanti Kusumaningtyas Institut Agama Islam Negeri (IAIN) Salatiga

Abstract

Technological developments allow the sending and storage of data can be done quickly, easily, practically, and safely. One security used uses cryptographic techniques. Cryptography is a technique of converting original text (plaintext) into secret text (ciphertext) using cryptographic algorithms (ciphers) or what is called the encryption process. The decryption process is the process of converting data encoded into original data. One of the cryptographic algorithms is the Cipher Transposition Algorithm. The analysis aims to determine the characteristics and application of the Transposition Cipher. The method used in this study by means of Study Literature, analyzes previous research from journals related to the Transposition Cipher Algorithm. The results are in the form of a view using the study literature method and knowing the characteristics and application of the Cipher Transposition algorithm and analyzing trends in previous studies.

 

Kata Kunci : Cryptography, Algorithms, Cipher Transposition, Study literature

References

Lengths Using an Improved Genetic Algorithm. World Applied Sciences Journal

Toemeh, R., Arumugam, S. 2007. Breaking Transposition Cipher with Genetic Algorithm. Electronics And Electrical Engineering

Mishra, A. 2013. Enhancing Security Of Caesar Cipher Using Different Methods. International Journal of Research in Engineering and Technology. Vol 02. Issue 09. Pp 327-332

Shukla, S., Verma, P.K. 2014. Implementation of Affine Substitution Cipher With Keyed Transposition Cipher for Enhancing Data Security. International Journal of Advanced Research in Computer Science and Software Engineering. Vol 4. Issue 1

Shrivastava, G., Sharma, R., Chouhan, M. 2013. Using Letters Frequency Analysis in Caesar Cipher With Double Columnar Transposition Technique. International Journal Of Engineering Sciences & Research Technology

Garg, P. 2009. Genetic Algorithms, Tabu Search And Simulated Anneling : A Comparison Between Three Approaches For The Cryptanalysis Of Transposition Cipher. Journal of Theoretical and Applied Information Technology

Benjamin, O., Garba, E.J.D. 2015. Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error. British Journal of Mathematics & Computer Science

Pohan, R.Y. 2007. Studi dan Perbadingan Berbagai Macam Algoritma Cipher Transposisi. Teknik Informatika : ITB

Dar, J.A. 2014. Enhancing The Data Security Of Simple Columnar Transposition Cipher By Caesar Cipher And Rail Fence Cipher Technique.

Sokouti, M., Sokouti, B., Pashazadeh, S. 2009. An Approach in Improving Transposition Cipher System. Indian Journal of Science and Technology

Quist., Kester, A. 2013. A Hybrid Cryptosystem Based On Vigenere Cipher And Columnar Transposition Cipher. International Journal Of Advanced Technology & Engineering Research (IJATER)

Russell, M.D., Clark, J.A., Steoney, S. [n.d]. Making the Most of Two Heuristics: Breaking Transposition Cipher with Ants.

Gupta, D.K., Srivastava, S.K., Singh, V. 2012. New Concept Of Symmetric Encryption Algorithm A Hybrid Approach Of Caesar Cipher And Columnar Transportation In Multi Stages. Journal of Global Research in Computer Science. Vol 3. Issue 1. January

Kumar, R. 2014. Integration Of Caesar Cipher with Redefence cipher Enhancing Data Security.International Journal for Scientific Research & Development. Vol 2. Issue 05

Sugumar, R., S, Tamulahenthi., Gurnathan, M. 2012. Review of Effective Data Encrystion and Decryption Technique

Annalakshmi, Mu. Padmapriya, A. 2012. Zigzag Ciphers : A Novel Transposition Method. International Conference on Computing and Information.

Christensen, C. 2006. Transposition Ciphers.http://www.nku.edu/, diakses pada 31 Agustus 2018

Bhowmick, A., Geetha, M. 2015. Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition, International Journal of Computer Sciences and Engineering. Vol. 03.Issue 02. Pp 20-27

Bhowmick, A., Lal, A.V., Ranjan, Nitish. 2015. International Journal Engineenering Research & Technology(IJERT). VOl 4. Issue 07. Pp 1001-1014.

Published

2018-12-31

Issue

Section

Articles