Implementation of Super Encryption Using Affine Cipher, Playfair Cipher, and RSA on Image Files

Authors

  • Muhamad Arif STMIK Kaputama
  • Achmad Fauzi STMIK Kaputama
  • Hermansyah Sembiring STMIK Kaputama

DOI:

https://doi.org/10.59934/jaiea.v5i1.1414

Keywords:

Affine Cipher, image Files, Playfair_Cipher, RSA, Super_Encryption

Abstract

This research aims to enhance the security of image files by implementing a super-encryption technique that integrates three cryptographic algorithms from both classical and modern domains: Affine Cipher, Playfair Cipher, and RSA. Each algorithm provides a distinct layer of encryption applied sequentially—starting with byte-value transformation using the Affine Cipher, followed by byte-pair substitution through the Playfair Cipher, and concluding with public-key RSA encryption. The proposed approach was evaluated on image files while ensuring both integrity and byte-level equivalence between the original and decrypted files. The implementation was developed as a desktop application in Visual Basic .NET, featuring separate modules for encryption and decryption, along with structured displays of results and process logs. Experimental results indicate that this super-encryption method successfully preserves file integrity and significantly increases cryptographic complexity without altering file size. System security is substantially improved, as the combined algorithms make the encrypted data highly resistant to analysis without complete knowledge of the underlying structure and encryption keys. This approach offers a viable alternative for securing sensitive image files, such as identity documents and medical records.

Downloads

Download data is not yet available.

References

R. Prastya, A. M. H. Pardede, and A. Fauzi, “Teknik Pembangkit Kunci Algoritma RSA Menggunakan Algoritma Diffie Hellman pada Keamanan Citra,” KAKIFIKOM (Kumpulan Artik. Karya Ilm. Fak. Ilmu Komputer), vol. 04, no. 01, pp. 16–22, 2022, doi: 10.54367/kakifikom.v4i1.1872.

C. Repi, J. Titaley, and E. Ketaren, “Implementasi Kriptografi Dalam Pengamanan Data Gambar Menggunakan Algoritma Rsa,” J. TIMES, vol. 13, no. 1, pp. 93–99, 2024, doi: 10.51351/jtm.13.1.2024750.

Imam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: 10.14421/jiska.2022.7.1.33-45.

H. Hendri, “Kompresi Citra dari Format BMP ke Format PNG,” J. TIMES, vol. 3, no. 1, pp. 27–31, 2014, doi: 10.51351/jtm.3.1.201412.

M. A. Abdussyukur, M. Toga, J. Sinaga, A. T. Zy, T. Informatika, and U. P. Bangsa, “ANALISIS METODE AFFINE CIPHER DENGAN KEYSTREAM ACAK UNTUK,” vol. 9, no. 2, pp. 2231–2236, 2025.

R. G. SINAMBELA and A. Fauzi, “Development of Hybrid Encryption Method Using Affine Cipher, Vigenere Cipher, and Elgamal Algorithm To Secure Text Messages in Data Communication System,” J. Artif. Intell. Eng. Appl., vol. 2, no. 2, pp. 30–40, 2023, doi: 10.59934/jaiea.v2i2.154.

I. Artikel, “ANALISIS TEKNIK PLAYFAIR DAN SHIFT CIPHER SEBAGAI METODE KRIPTOGRAFI KLASIK UNTUK KEAMANAN DATA,” pp. 13–19, 2025.

A. Japardi, E. Louis Frasetyo, A. Sahertian, C. Umam, and G. A. Trisnapradika, “Playfair Cipher untuk Kriptografi ASCII menggunakan Matriks 9x10,” J. Komputasi dan Pengemb. Apl., vol. 1, no. 1, pp. 40–49, 2025.

A. R. Mido and E. I. H. Ujianto, “Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB,” J. Teknol. Inf. dan Ilmu Komput., vol. 9, no. 2, p. 279, 2022, doi: 10.25126/jtiik.2022914852.

T. B. Surbakti, A. Fauzi, and H. Khair, “Rivest Shamir Adleman (RSA) Hybrid Algorithm System and the deep Blum Blum Shub (BBS) Algorithm Securing E-Absence Database Files,” Indones. J. Educ. Comput. Sci., vol. 1, no. 2, pp. 53–61, 2023, doi: 10.60076/indotech.v1i2.59.

Downloads

Published

2025-10-15

How to Cite

Arif, M., Achmad Fauzi, & Hermansyah Sembiring. (2025). Implementation of Super Encryption Using Affine Cipher, Playfair Cipher, and RSA on Image Files. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(1), 690–699. https://doi.org/10.59934/jaiea.v5i1.1414