Journal of Information Technology (JIfoTech)
Vol 2 No 1 (2022): Journal of information Technology

Analisa Algoritma Kriptografi Klasik Caesar Cipher Viginere Cipher dan Hill Cipher – Study Literature

Noviyanti. P (Institut Shanti Bhuana)
Mira (Universitas Kristen Satya Wacana)

Article Info

Publish Date
21 Mar 2022


The process of encryption and description of a message is a third party called cryptography. Cryptography is a technique for securely transferring information between two parties without intervention by external elements. The process of securing information can be done with several available cryptographic algorithms. Cryptographic algorithms consist of two eras, namely, classical algorithms and modern algorithms. Classical algorithms were generally used in the past using only substitution and permutation methods. While modern algorithms are algorithms that can be recognized, read and understood by computers that produce the numbers 0 and 1 or commonly called binary data. The purpose of the analysis is to determine the development of security and complexity of standard classical algorithms and classical algorithms with modifications.

Copyrights © 2022

Journal Info





Computer Science & IT


Journal of Information Technology (JIfoTech) contains research articles in the scope of information technology, in the form of Internet of Things (IoT), web technology, databases, artificial intelligence, business intelligence, security and network infrastructure, human and computer interaction ...