Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Volume 2, Issue 5, Page No 6-12, 2017

Author’s Name: Dewi Sartika Ginting1, a), Kristin Sitompul1, Jasael Simanulang1, Rahmat Widia Sembiring2, Muhammad Zarlis3

View Affiliations

1Faculty of Computer and Information Technology, Universitas Sumatera Utara, Medan, 20155, Indonesia

2Politeknik Negeri Medan, Medan, 20155, Indonesia

3University of North Sumatera, Medan, 20155, Indonesia

a)Author to whom correspondence should be addressed. E-mail: dewigintingdg90@gmail.com

Adv. Sci. Technol. Eng. Syst. J. 2(5), 6-12 (2017); a DOI: 10.25046/aj020502

Keywords: Chiper affine, Caesar chiper, Dynamic nature

Share

692 Downloads

Export Citations

Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine chiper, Caesar chiper and chiper transposition. Where for chiperteks affine chiper and Caesar chiper can be looped as much as the initial key, because the result can be varied as much as key value, then affine chiper and Caesar chiper in this case is dynamic. Then the results of the affine and Caesar will be combined in the transposition chiper matrix by applying the pattern of rice cultivation path and for chipertext retrieval by finally applying the pattern of rice planting path. And the final digit of the digit shown in the form of binary digits so that 5 characters can be changed to 80 digit bits are scrambled. Thus the cryptanalyst will be more difficult and takes a very long time to hack information that has been kept secret.

Received: 14 March 2017, Accepted: 20 April 2017, Published Online: 13 June 2017

1. Introduction

A security issue is one of the most important aspects of an Advancements in the field of computer technology allows thousands of people and computers around the world connected in a virtual world known as cyberspace or Internet. But unfortunately, technological advances are always followed by a downside to the technology itself. One is the susceptibility of data security, giving rise to the challenges and demands the availability of a data security system is as sophisticated as the technology advances of the computer itself. This is the background of the development of a data security system to protect data transmitted through a communications network [1]. There are several ways to do security data through one channel, one of which is cryptography. In cryptography, data transmitted via the network will be disguised in a way that even if the data can be read then it cannot be understood by unauthorized parties. Data to be transmitted and not experienced isitilah encoding known as plaintext, and after camouflaged with a way of encoding, then this will turn plaintext into ciphertext. The functions that are fundamental in cryptography is encryption and decryption [2].

Many cryptographic techniques are implemented to safeguard information, but the present condition is much too way or the work done by cryptanalysis to break it. Though an important thing in the delivery of the message is to maintain the security of the information that are not easily known or manipulated by other parties. One solution that can be done is to modify the cryptography solved or create a new cryptography so that it can be an alternative for securing messages [3].

This study design a symmetric key cryptography by using 3 classical cryptographic algorithm, of which two are affine and Caesar chiperteksnya results will be dynamic (changing). And the matrix transposition cipher is a medium to combine chiperteks affine and Caesar on the technique of laying of the bits in the matrix using the rice planting furrow pattern and sampling technique of bits to be chiperteks end using the groove pattern-making transplanting rice. And in this study chiperteks be displayed in the form of binary numbers are 1 and 0. This research could be useful as a modification that serve as an alternative cryptographic security of information, so that the cryptanalyst would have difficulty or even require a very long time in the hacking of information [4-10].

2.       Theoretical Basic

Encryption is the process of converting a plain text to be a message in the ciphertext.

C = E (M)

Where:

M = original message

E = encryption process

C = message in code (for brevity called the password), while

Decryption is the process of changing the password message in one language into the original message back.

M = D (C)

Where:

D = the decryption process

Generally, apart from using certain functions in the encryption and decryption, it is often a function was given an additional parameter called the key terms. For example, the original text: “experience is the best teacher”. Once encrypted password algorithm with key xyz and PQR into cipher text: V583ehao8 @ $%.

2.1.  Algorithm of Affine Chiper

Affine cipher on the method of affine is an extension of the method Caesar Cipher, which divert the plaintext with a value and add it with a shift of P produce ciphertext C is expressed by the function of congruent:

C ≡ m P + b (mod n)

In which n is alphabet size, m is an integer which must be relatively prime to n (if not relatively prime, then the decryption can not be done) and b is the number of shifts (Caesar cipher is the specialty of affine cipher with m = 1). To carry out the description, equation (4) herus solved to obtain a solution P. congruence exists only if inver m (mod n), expressed in m -1.Jikam -1 exists then decryption is done by the following equation:

P ≡ m -1(C – b) (mod n)

2.2.  Algorithm of Caesar Chiper

Cryptographic one of the oldest and simplest is Caesar cryptography. Historically, this is how Julius Caesar send important letters to the governors. Caesar cryptographic formula, generally can be written as follows:

C = E (P) = (P + k) mod 26

P = D (C) = (C k) mod26, where

P is the plaintext,

C is the ciphertext,

K is shifting letter corresponding to the desired key.

2.3.  Algorithm of Chiper Transposition

Cryptographic in column (column cipher), plaintext letters are arranged in groups consisting of several letters. Then the letters in this group write a column by column, the order of columns can be fickle. Cryptography column is one example of cryptographic methods of transposition. Example Cryptography Column:

The phrase ‘FATHER HAS ARRIVED YESTERDAY AFTERNOON’, if arranged in columns 7 letter, it will be the following columns:

Figure 1. Structure of Character Chiper Transposition

To complete the last column that contains 7 letters, then the rest is filled with the letters’ A ‘can be any letter or as a complementary letter. Tesebut sentence after 7 columns encrypted with a key sequence of letters and 6,725,431, the result of the encryption:

Figure 2. Column Encryption of Chiper Transposition

3.       Research Methods

3.1.  Research Design

In the development of classical cryptography is included 3 classic algorithm that is affine cipher, Caesar cipher and a transposition cipher. Wherein the plaintext to be executed by using affine cipher and the Caesar cipher in advance separately, and in the encryption process is dynamic, ie chiperteks generated by affine and caesarean may change according to the wishes, of which a maximum of change as the keys that are used at the beginning of the process affine and Caesar.

Changes that occur chiperteks generated by looping the same process. Below we can see the design of stages of research:

And to process returns to the plaintext message from chiperteks called process descriptions, can be seen in the design below:

3.2.  3.2. Limitations of Problem

To not extend the scope of the discussion of the given limitations in this study, namely;

  1. The process of encryption and decryption is done on the text.
  2. Key b at the same affine with key k at Caesar specified by the author of the message and should be a number, whereas m in the affine key is a prime number.
Figure 3. Research Design Process Encryption
  • Affine cipher algorithm and a Caesar cipher generates a dynamic chiperteks, where the results are changed just as much as the initial key specified by the author of the message.
  1. Recurrence happened not more than the limit, and the limit on the initial key = used affine key (b) and Caesar (key k).
Figure 4. Process Research Design Description
Figure 5. Pattern of Rice Planting
  • Laying chiperteks affine and Caesar on Marik transposition cipher using rice cropping patterns and making the character to chiperteksnya is to use pattern-making transplanting rice.

4.       Results and Discussions

This study to design the development of classical cryptography involving three classic algorithms are affine cipher, Caesar cipher and a transposition cipher, where the encryption result of the affine cipher and the Caesar cipher is dynamic. And matrices on transposition cipher contain binary blend chiperteks of affine cipher and the Caesar cipher.

4.1.   Rice Planting Pattern Flow

Method rice planting is usually done in a long horizontal continuous with mapped fields. This study used the same way as the planting of rice, using a matrix transposition ciphe

4.2.  Flow Pattern Making Rice Planting

Rice planting take groove pattern is used as a pattern for the process description, which is to get back the encrypted plaintext before the rice planting groove pattern on the matrix transposition cipher.

Figure 6. Flow Patterns Rice Planting Decision

4.3.  Flowchart of Encryption

In cryptography this modification, first in plaintext encryption process we execute with affine cipher and the Caesar cipher separately. Where the results of the affine cipher encryption and later Caesar cipher is a dynamic, namely chiperteks generated by each algorithm can be fickle. It is very helpful to add to the confusion of the cryptanalyst. And to create dynamic results, the authors do looping on the affine cipher or Caesar cipher formula denagn respectively. But in this study, we limit the repetition can be done, namely a maximum of keys are initialized at the beginning. For example, key in the beginning is 15, then looping may occur up to 15 times.

a.Affine Chipper Encryption

Figure 7. Flowchart of Affine Chiper

  1. Caesar Chiper Encryption

Figure 8. Flowchart of Caesar Chiper

  1. Encryption of Chiper Transposition

Figure 9. Flowchart encryption of Chiper Trasnposition

In transposition ciphers will be included chiperteks of affine cipher and the Caesar cipher to the matrix. Chiperteks of affine and Caesar in the form of binary digits, and the digits of the binary is placed into the matrix to follow the pattern of grooves cropping with the provisions of the first line starts from the affine cipher followed by a Caesar cipher and so on so forth until all the binary digits chiperteks on affine and Caesar composed both in the matrix transposition cipher.

4.4.  Flowchart of Description

For the description of the process of restoring the messages that have been encrypted, or in other words to restore the plaintext of chiperteks, starting from a transposition cipher.

  1. Description of Transposition Chiper

Figure 10. Flowchart Description of Chiper Trasnposisi

After receiving the plaintext of a transposition cipher, the plaintext is chiperteks results affine and Caesar cipher encryption. It is still necessary for the next stage of the description that the message be the same again. And the next process is mendeksripsikan the description of a transposition cipher using a formula descriptions affine cipher and the Caesar cipher.

  1. Affine Chiper Description

Figure 11. Flowchart of Affine Chiper

  1. Chipper Description

Figure 12. Flowchart of Caesar Chiper

4.5.  Discussion of combined Affine chiper and Caesar chiper in the matrix of Chiper Transposition

For processes in detail, if we presuppose the plaintext is Y and chiperteks is C were converted into bits, then:

Y = {Y1, Y2, Y3, Y4, Y5, …, Yn}

Y1 = {C1, C2, C3, …, C8}

Y2 = {C9, C10, C11, …, C16}

Y3 = { C17, C18, C19, …, C24}… and so on up to Yn.

To process the cipher transposition, then we take chiperteks on affine cipher and the Caesar cipher and place in the matrix with the provisions of the algorithm is:

The first line is the first character or that has been converted into 8-digit bit chiperteks of affine, which started with a pattern of grooves rice planting ie from left to right on the first row (odd) and so on.

Then for the second row, followed by the first character of the Caesar cipher chiperteks or 8-digit bit after conversion is done according to the rules also cropping the groove pattern from left to right of the second row (even) and so on.

So can we symbolize results occur:

Description     :               A symbol is Affine Chiper, and

                                               B Symbol is Caesar Chiper.

Figure 13. Matrix Encryption of Chiper Transposition (Put plaintext)

See matrix above, the number of bits is 8 x 10 = 80 bits, which consists of 40 bits and 40 bits affine Caesar. And the last step in the process of encryption to obtain chiperteks the above matrix is to apply the rice cropping making workflow, from left column top to bottom and so on.

The matrix can be seen in the figure below:

Figure 14. Matrix Encryption of Chiper Transposition  (Decision Chiperteks)

From the matrix above, we can take chiperteks by following the rice planting groove pattern as above, then chipertek is:

C ={C1A, C8B, C9A, C16B, C17A, C24B, C25A, C32B, C33A, C40B, C39B, C34A, C31B, C26A, C23B, C18A, C15B, C10A , C7B, C2A, … … …, C33B, C40A, C25B, C32A, C27B, C24A, C9B, C16A, C1B, C8A}

Chiperteks that have been obtained in the above then we descriptions to get the plaintext back. This is what will be done recipient messages or information. The algorithm description on transposition cipher chiperteks above is:

  1. Put chiperteks transposition cipher encryption on the results into the matrix, where the matrix is a comprehensive description width x length (number of characters x number of bits per character) or the inverse of the encryption process. Peletakannya same way with encryption that is by adopting a rice planting furrow.

Figure 15. Matrix Description of Chiper Transposition (Put Chiperteks)

  1. After putting chiperteks into the matrix, then the next step is to take the initial plaintext or chiperteks of affine and Caesar by following the flow of the rice-planting decision.

Figure 16. Matrix Description of Chiper Transposition (Plaintext Intake / Chiperteks1)

  1. And can be seen in the matrix with the pattern of grooves taking over the rice planting, that plaintext or chiperteks 1 which means chiperteks of affine and Caesar already apparent. If we write the tracks arrow then these bits are arranged well and return to the previous message. And it seems clear also that the symbol is a bit affine cipher A and B are Caesar cipher. The results of the description if written is:

P = {P1A, P2A, P3A, P4A, P5A, P6A, P7A, P8A, C1B, C2B, C3B, C4b, C5b, C6b, C7B, C8B, C9A, C10A, C11A, C12A, C13A, C14A, C15A, C16A … … …, C33A, C34A, C35A, C36A, C37A, C38A, C39A, C40A, C33B, C34B, C35B, C36B, C37B, C38B, C39B, C40B}

4.6.  Test Result

There are some that can can of this algorithm, the invention includes some strengths and weaknesses in this algorithm. Namely:

  1. Advantages :
  2. The results of the dynamic at chiperteks early stage in the process of the affine cipher and the Caesar cipher, becomes a strength because the results can vary and this will make the cryptanalyst becomes more difficult to hack.
  3. Chiperteks end that is sent to the message recipient is the number of binary digits, so if 5 characters or one word shall we send, will generate 80 digit bit. And even this 80-digit randomly arranged by rice cropping pattern groove, so that in testing it becomes an advantage in this algorithm.
  4. Weaknesses :

However, there are things that still looks weak in the algorithm, namely a recurrence that may be performed in affine and Caesar does not exceed the value of the key early, it can be said that the larger the key will be the better, but if the keys are initialized at the beginning of the small, then the less recurrence happens that a hacker does not require a long time to try to hijack the message.

5.       Conclusions

  1. Chiperteks dynamic process and Caesar affine cipher is also an important point on the modification of this algorithm, as plaintext consists of one message alone can generate an arbitrary chiperteks. And this technique can also trickthe cryptanalyst.
  2. The use of algorithms rice planting groove pattern on the matrix transposition cipher can prove that this technique generates a symmetric cryptographic methodology stronger.
  3. The combination of several methods on classical cryptography such as affine cipher, Caesar cipher and a transposition cipher increase the level of difficulty of this cryptography. The encryption process is layered with berebeda method will make hackers need at a very long time to steal the information or message.
  4. Chiperteks display in the form of binary digits that doubled the number of bits in each character, will help add to the confusion cryptanalyst for one word alone can produce tens or hundreds of binary bits consist of 1 and 0.
  1. Widodo Achmad, “Block Cipher Cryptography Design Based on Planting Paddy and Rice Field Techniques”. Bandung, April 2015.
  2. Dunkom. Binary Numbers, (Binary), http: //www.dunovtek. WordPress. Com / 2011/08/05 / number-binary-binary, 2011.
  3. Ridwan, “Designing The Key Symmetry Cryptography Algorithm By Expanding the Vigenere Algorithm and Analysis of Kasiski’s Methods Against the Algorithm”, http: //informatika.stei.itb.ac.id/~inalinal.munir Cryptography. 2006-2007 / Makalah1 / Makalah1-040.pdf.
  4. Munir, R., 2006, Cryptography, Informatics Publishers, Bandung.
  5. Hadiwibowo.Pengamanan Information and Cryptography – Adding khasanah reading cryptology and information security for the people of Indonesia. Http://hadiwibowo.wordpress.com., December 23, 2006.
  6. http://download.portalgaruda.org/article.php?article=423826&val=7596&title=Implementasi%20Combination%20Algorithms%20Encryption%20Aes%20128 [12]% 20And% 20Algorithm% 20Compression% 20Shannon-Fano.
  7. Piper, Fred and Sean Murphy.Cryptography A Very Short Introduction Oxford; 2002.
  8. Munir, Rinaldi. 2004. Diktat Lecture IF2153 Discrete Mathematics – Fourth Edition. Bandung: Tenik Informatika Study Program, STEI ITB. 2004. Classic Chiper System. http: //kur2003.if.itb.ac.id/file/System%20Chiper%20Klasik.doc.
  9. Ardiansyah Rifky, “Development of Viginere Chiper Algorithm Using Binary-Based Lock Method”, http://digilib.unmuhjember.ac.id/files/disk1/37/umj-1x-rifkyardia-1813-1-jurnal.pdf.
  10. Mischanz. 2009. Character and Table ASCII, http://mischanz.wordpress.com/2009/12/12/character-and-table-ascii.

Citations by Dimensions

Citations by PlumX

Google Scholar

Scopus

Crossref Citations

  1. Sanjeev Kumar, Madhu Sharma Gaur, Prem Sagar Sharma, Deepkiran Munjal, "A Novel Approach of Symmetric Key Cryptography." In 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp. 593, 2021.

No. of Downloads Per Month

No. of Downloads Per Country

Special Issues

Special Issue on Computing, Engineering and Multidisciplinary Sciences
Guest Editors: Prof. Wang Xiu Ying
Deadline: 30 April 2025

Special Issue on AI-empowered Smart Grid Technologies and EVs
Guest Editors: Dr. Aparna Kumari, Mr. Riaz Khan
Deadline: 30 November 2024

Special Issue on Innovation in Computing, Engineering Science & Technology
Guest Editors: Prof. Wang Xiu Ying
Deadline: 15 October 2024