A combination of hill cipher and RC4 methods for text security

Azanuddin Azanuddin, Rikie Kartadie, Fauzi Erwis, Ahmad Fitri Boy, Asyahri Hadi Nasyuha

Abstract


To hide confidential messages from people who are not responsible or who can access the messages, a way is needed to hide the messages. One way to hide messages in transmission is to change the data into something unintelligible by encoding and embedding it using cryptography and steganography techniques. This application was built using the hill cipher algorithm and the Rivest Cipher 4 (RC4) method. This algorithm is a symmetric key algorithm which has several advantages in data encryption. The hill chiper algorithm uses a mxm matrix as the encryption and decryption key. Meanwhile, the RC4 symmetric key is in the form of a stream cipher which can process input data as well as messages or information. Input data is generally in the form of bytes or even bits. The results of this research show that hill cipher and RC4 have their respective advantages and disadvantages. However, currently, RC4 is generally considered less safe for use in security-critical scenarios due to its vulnerability to attack. It is highly recommended to use an encryption algorithm such as advanced encryption standard (AES) which is modern and strong and has been tested and proven to be more resilient.

Keywords


combination; data security; hill chiper; rivest cipher; rivest cipher 4;

Full Text:

PDF


DOI: http://doi.org/10.12928/telkomnika.v22i2.25628

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

TELKOMNIKA Telecommunication, Computing, Electronics and Control
ISSN: 1693-6930, e-ISSN: 2302-9293
Universitas Ahmad Dahlan, 4th Campus
Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191
Phone: +62 (274) 563515, 511830, 379418, 371120
Fax: +62 274 564604

View TELKOMNIKA Stats