Simulation of The Application of Intelligence in Vernam Cipher Cryptography (One Time Pad)

##plugins.themes.academic_pro.article.main##

Agustina Simangunsong
R. Mahdalena Simanjorang

Abstract

Technological advances in the field of computers allow thousands of people and computers around the world to be connected in one virtual world known as cyberspace or the Internet. But these technological advances are always accompanied by the downside of the technology itself. One of them is the vulnerability of data security, giving rise to challenges and demands for the availability of a data security system that is as sophisticated as the advancement of computer technology itself. In this study, an algorithm that can secure data will be used which the authors discuss is the Vernam Cipher Algorithm. Vernam Cipher Algorithm is one of the key algorithms. Until now, the Vernam Cipher algorithm is still trusted as an encryption method, Vernam Cipher cryptography uses the same key for encryption and decryption.

##plugins.themes.academic_pro.article.details##

How to Cite
Agustina Simangunsong, & Simanjorang, R. M. (2021). Simulation of The Application of Intelligence in Vernam Cipher Cryptography (One Time Pad). Login : Jurnal Teknologi Komputer, 15(1), 45-50. Retrieved from http://login.seaninstitute.org/index.php/Login/article/view/85

References

[1] Agustanti, Sri Primaini, Pengamanan Kunci Enkripsi One Time Pad menggunakan Enkripsi RSA, Jurnal Media Teknik, 2010
[2] Blum, L., Blum, M., Shub, M., A Simple Unpredictable Pseudo-Random Number Generator, Society For Industrial and Applied Mathematics, 1986.
[3] Blum, Manuel., Micali, Silvio, How to Generate Cryptographically Strong Sequence of Pseudo Random Bits.
[4] Junod, Pascal, Cryptographic Secure Pseudo-Random Bits Generation: The Blum Blum Shub Generator, 1999
[5] Leung, Debbie W., Quantum One Time Pad Cipher, Quantum Information and Computation, 2001
[6] Menezes, A., Oorschot, van P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996
[7] Munir, Rinaldi, Algoritma Enkripsi Citra dengan pseudo One-Time Pad yang menggunakan sistem chaos, Konferensi Nasional Informatika, 2011
[8] Munir, Rinaldi, Kriptografi, Penerbit Informatika, Bandung, 2005
[9] Sholeh, M., Hamokwarong, J.V., Aplikasi Kriptografi dengan metode One Time Pad Cipher dan Metode Permutasi, Momentum, 2011
[10] Stalling, William, Cryptography and Network Security, Principle and Practice, Pearson Education, 2003