Application Of Super Encryption Using Rot 13 Algorithm Method and Algorithm Beaufort Cipher For Image Security Digital
Keywords:Key: cryptography, image, rot13 algorithm, beaufort cipher algorithm.
Digital image security is becoming increasingly critical in today's digital era, where sensitive information and data are often stored in image form. Therefore, an effective and secure encryption method is needed to protect the integrity and confidentiality of digital images. This study aims to implement a stronger security approach by combining classic encryption methods, namely the ROT13 algorithm and the Beaufort Cipher algorithm which produces an encryption called "Super Encryption".
In this study, first of all, the ROT13 encryption method will be applied to randomize digital image text by shifting characters as far as 13 positions in the alphabet. Then, the Beaufort Cipher algorithm will be used to apply additional encryption to the digital image, which involves using the key as input in the encryption process.
The results of this study indicate that the Super Encryption method which combines the ROT13 and Beaufort Cipher algorithms provides a higher level of security compared to using each method separately. Security testing and vulnerability analysis show that the combination of these two algorithms produces digital images that are more difficult to decrypt by commonly used decryption attacks.
A, A. A. R. P. W., Maulana, M. H., Andini, C. D., Nadziroh, F., & Semen, K. (2018). ONLINE ROOM BORROWING SYSTEM ( SPRO ) WITH UML METHOD ( UNFIELD MODELING LANGUAGE ) Abstract The process of borrowing a room is done manually , which is Akademi Komunitas Semen. 1(1), 1–8.
Aresta, R. M., Pratomo, E. W., Geraldino, V., Santoso, J. D., & Mulyatun, S. (2020). Implementation of Multi Encryption Rot 13 on the Whatsapp Symbol. Journal of Information System Management (JOISM), 2(1), 1–5. https://doi.org/10.24076/joism.2020v2i1.158
Asraidah Linga. (2019). Analysis of the Implementation of Wav Audio File Security Applications by Applying the Beaufort Cipher and Root Algorithms 13. Journal of Pelita Informatics, 8, 33–40.
HUTABARAT, J. (2018). Implementation of Rot13 Algorithm and Caesar Ciper in Web-Based Text Encoding. 13(Rotate 13), 38–41. http://repository.potential-utama.ac.id/jspui/handle/123456789/3242
Josi, A. (2017). Application of the Prototyping Method in Building Village Websites (Case Study of Sugihan Village, Rambang District). Jti, 9(1), 50–57.
Maria, R., Br, U., Fauzi, A., Sembiring, H., & Utara, S. (2021). VIGENERE CIPHER AND ONE TIME PAD ALGORITHM COMBINATION. 5(1), 137–146.
Ndruru, E., & Zebua, T. (2022). Generation of Beaufort Cipher Keys Using the Blum-blum Shub Technique in Digital Image Security. Bulletin of Information Technology (BIT), 3(2), 149–154.
Rachmadsyah, A., Perdana, A., & Budiman, A. (2020). Combination of Beaufort Cipher and Vigenere Cipher Algorithms for Mobile Application-Based Text Message Security. Polgan Minfo Journal, 9(2), 12–17.
Rachmancto, A. (2021). Information Technology Sophistication and User Participation Impact on the Effectiveness of Accounting Information Systems. Nuevos Sistemas de Comunicación e Información, 2013–2015.
Siregar, H. F., Siregar, Y. H., & Melani, M. (2018). (2018). Multimedia-Based Hadith Comic Application Design. JurTI (Information Technology Journal), 2(2), 113-121. JurTI (Information Technology Journal), 2(2), 113–121. http://www.jurnal.una.ac.id/index.php/jurti/article/view/425
How to Cite
Copyright (c) 2023 Journal of Artificial Intelligence and Engineering Applications (JAIEA)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.