Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

Data Science: Journal of Computing and Applied Informatics

View Publication Info
 
 
Field Value
 
Title Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish
 
Creator Haryono, Wasis
 
Subject Caesar Cipher, Hill Cipher, Blowfish, Twofish
 
Description Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.
 
Publisher Talenta Publisher
 
Date 2020-07-31
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
 
Identifier https://talenta.usu.ac.id/JoCAI/article/view/4004
10.32734/jocai.v4.i2-4004
 
Source Data Science: Journal of Computing and Applied Informatics; Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
2580-829X
2580-6769
 
Rights Copyright (c) 2020 Data Science: Journal of Computing and Applied Informatics
https://creativecommons.org/licenses/by-nc-nd/4.0
 

Contact Us

The PKP Index is an initiative of the Public Knowledge Project.

For PKP Publishing Services please use the PKP|PS contact form.

For support with PKP software we encourage users to consult our wiki for documentation and search our support forums.

For any other correspondence feel free to contact us using the PKP contact form.

Find Us

Twitter

Copyright © 2015-2018 Simon Fraser University Library