Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 8, No. 4, November 2023
  4. Articles

Issue

Vol. 8, No. 4, November 2023

Issue Published : Nov 30, 2023
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Testing Data Security Using a Vigenere Cipher Based on the QR Code

https://doi.org/10.22219/kinetik.v8i4`.1734
Eko Hari Rachmawanto
Universitas Dian Nuswantoro
Rizky Syah Gumelar
University of Dian Nuswantoro
Qotrunnada Nabila
University of Dian Nuswantoro
Christy Atika Sari
University of Dian Nuswantoro
Rabei Raad Ali
Northern Technical University

Corresponding Author(s) : Eko Hari Rachmawanto

eko.hari.rachmawanto@dsn.dinus.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 8, No. 4, November 2023
Article Published : Nov 30, 2023

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.

Keywords

Cryptography Encryption Decryption QR code Vigenere Cipher
Rachmawanto, E. H., Gumelar, R. S., Nabila, Q., Sari, C. A., & Ali, R. R. (2023). Testing Data Security Using a Vigenere Cipher Based on the QR Code. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 8(4`). https://doi.org/10.22219/kinetik.v8i4`.1734
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. Sun, P. J. (2019). Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access, 7, 147420–147452. https://doi.org/10.1109/ACCESS.2019.2946185
  2. Mondal, S.K., Mukhopadhyay, I., Dutta, S. (2020). Review and Comparison of Face Detection Techniques. In: Chakraborty, M., Chakrabarti, S., Balas, V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_1
  3. Hidayat, T., & Mahardiko, R. (2020). A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing. International Journal of Artificial Intelligence Research, 4(1). https://doi.org/10.29099/ijair.v4i1.154
  4. Adil Yazdeen, A. ., Zeebaree , S. R. M. ., Mohammed Sadeeq, M., Kak, S. F. ., Ahmed, O. M. ., & Zebari, R. R. (2021). FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review. Qubahan Academic Journal, 1(2), 8–16. https://doi.org/10.48161/qaj.v1n2a38
  5. Machin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and security in cognitive cities: A systematic review. In Applied Sciences (Switzerland) (Vol. 11, Issue 10). MDPI AG. https://doi.org/10.3390/app11104471
  6. Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
  7. A. R. Sai, J. Buckley and A. Le Gear, "Privacy and Security Analysis of Cryptocurrency Mobile Applications," 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 2019, pp. 1-6, doi: 10.1109/MOBISECSERV.2019.8686583.
  8. Dave, R., R Sowells Boone, E., & Roy, K. (2019). Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications, 7(1), 31–36. https://doi.org/10.12691/jcsa-7-1-5
  9. Malik, S., Khattak, H. A., Ameer, Z., Shoaib, U., Rauf, H. T., & Song, H. (2021). Proactive Scheduling and Resource Management for Connected Autonomous Vehicles: A Data Science Perspective. IEEE Sensors Journal, 21(22), 25151–25160. https://doi.org/10.1109/JSEN.2021.3074785
  10. Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. In Egyptian Informatics Journal (Vol. 22, Issue 2, pp. 177–183). Elsevier B.V. https://doi.org/10.1016/j.eij.2020.07.003
  11. Alqadi, Z., Abu-Faraj, M., & Alqadi, Z. A. (2021). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Mua’ad. IJCSNS International Journal of Computer Science and Network Security, 21(12). https://doi.org/10.22937/IJCSNS.2021.21.12.61
  12. Navid Bin Anwar, M., Hasan, M., Hasan, M., Loren, J. Z., & Tanjim Hossain, S. M. (2019). Comparative Study of Cryptography Algorithms and Its’ Applications. In International Journal of Computer Networks and Communications Security (Vol. 7, Issue 5). www.ijcncs.org
  13. Benssalah, M., Rhaskali, Y., & Drouiche, K. (2021). An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications, 80(2), 2081–2107. https://doi.org/10.1007/s11042-020-09775-9
  14. Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73–80. https://doi.org/10.1109/TSMC.2019.2903785
  15. Wahab, O. F. A., Khalaf, A. A. M., Hussein, A. I., & Hamed, H. F. A. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805–31815. https://doi.org/10.1109/ACCESS.2021.3060317
  16. Hureib, E., Gutub, A., bin Hureib, E. S., & Gutub, A. A. (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography Steganography and Secret sharing View project Cryptography and Steganography View project Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. In IJCSNS International Journal of Computer Science and Network Security (Vol. 20, Issue 8). https://www.researchgate.net/publication/344311992
  17. Alyousuf, F. Q., Qasim, F., Al-Yousuf, A., & Din, R. (2020). Review on secured data capabilities of cryptography, steganography, and watermarking domain Topic identification using filtering and rule generation algorithm for textual document View project The modeling of E-Supervised (E-SUV) for distance learning centre View project Review on secured data capabilities of cryptography, steganography, and watermarking domain. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), 1053–1059. https://doi.org/10.11591/ijeecs.v17.i2.pp1053-1059
  18. Alqad, Z., Majid Oraiqat, ;, Almujafet, ; Hisham, Al-Saleh, S., Hind, ;, Husban, A., & Al-Rimawi, S. (2019). International Journal of Computer Science and Mobile Computing A New Approach for Data Cryptography. In International Journal of Computer Science and Mobile Computing (Vol. 8, Issue 9). www.ijcsmc.com
  19. Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
  20. Abu-Faraj, M. M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement Du Signal, 39(1), 173–178. https://doi.org/10.18280/ts.390117
  21. Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95 95 Table. International Journal of Engineering and Advanced Technology, 9(5), 1144–1148. https://doi.org/10.35940/ijeat.E9941.069520
  22. Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009
  23. Voleti, L., Balajee, R. M., Vallepu, S. K., Bayoju, K., & Srinivas, D. (2021). A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm. Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021, 1005–1010. https://doi.org/10.1109/ICAIS50930.2021.9395794
  24. Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
  25. Sermeno, J. P., Secugal, K. A. S., & Mistio, N. E. (2021). Modified Vigenere cryptosystem: An integrated data encryption module for learning management system. International Journal of Applied Science and Engineering, 18(4(Special Issue)), 1–10. https://doi.org/10.6703/IJASE.202106_18(4).003
  26. Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1
  27. Politeknik Ganesha Medan, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. International Journal of Information System & Technology Akreditasi, 4(1), 471–481. https://doi.org/10.30645/ijistech.v4i1.85
  28. Kumar Mittal, V., Mukhija, M., & Tech, M. (2019). Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique the Creative Commons Attribution License (CC BY 4.0). International Journal of Trend in Scientific Research and Development (IJTSRD) International Journal of Trend in Scientific Research and Development, 5, 1936–1939. https://doi.org/10.31142/ijtsrd27878
  29. Khasanah, Nguyen, P. T., Gunawan, G., & Rahim, R. (2020). Three-pass protocol scheme on vigenere cipher to avoid key Distribution. Journal of Critical Reviews, 7(1), 68–71. https://doi.org/10.22159/jcr.07.01.13
  30. Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2023). Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation. Wireless Personal Communications, 129(1), 271–284. https://doi.org/10.1007/s11277-022-10097-2
  31. Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021). A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher. Journal of Physics: Conference Series, 1997(1). https://doi.org/10.1088/1742-6596/1997/1/012021
  32. Rizal, A., Utomo, D. S. B., Rihartanto, R., Hiswati, M. E., & Haviluddin, H. (2019). Modified key using multi-cycle key in vigenere cipher. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 2600–2606. https://doi.org/10.35940/ijrte.B1313.0982S1119
  33. S. Vatshayan, R. A. Haidri and J. Kumar Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," 2020 International Conference on Computational Performance Evaluation (ComPE), Shillong, India, 2020, pp. 848-852, doi: 10.1109/ComPE49325.2020.9199997.
  34. Uniyal, N., Dobhal, G., Rawat, A., & Sikander, A. (2021). A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Personal Communications, 119(2), 1577–1587. https://doi.org/10.1007/s11277-021-08295-5
  35. Ahamed, B. B., & Krishnamoorthy, M. (2022). SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm. Journal of the Operations Research Society of China, 10(4), 835–848. https://doi.org/10.1007/s40305-020-00320-x
  36. A. Nuhi, A. Memeti, F. Imeri and B. Cico, "Smart Attendance System using QR Code," 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 2020, pp. 1-4, doi: 10.1109/MECO49872.2020.9134225.
  37. Tiantian Wang , Fei Jia, The impact of health QR code system on older people in China during the COVID-19 outbreak, Age and Ageing, Volume 50, Issue 1, January 2021, Pages 55–56, https://doi.org/10.1093/ageing/afaa222
  38. A. G. Khan, A. H. Zahid, M. Hussain and U. Riaz, "Security Of Cryptocurrency Using Hardware Wallet And QR Code," 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-10, doi: 10.1109/ICIC48496.2019.8966739.
  39. Dey, S., Saha, S., Singh, A. K., & McDonald-Maier, K. (2021). FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063486
  40. Mohammed Ali, A., & Farhan, A. K. (2020). Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access, 8, 27448–27458. https://doi.org/10.1109/ACCESS.2020.2971779
  41. Putra, I. P., Witriyono, H. ., Rifqo, M. H. ., & Muntahanah, M. (2022). Utilization of Base64 Encryption Repetition for QR Code Presence on Online Attendance. Jurnal Komputer, Informasi Dan Teknologi (JKOMITEK), 2(2), 519–528. https://doi.org/10.53697/jkomitek.v2i2.942
  42. Ichsan, M., & Hutrianto, H. (2022). Implementasi Algoritma Vignere Chiper Berbasis QRCode Untuk Absensi Pegawai PT. Delameta Bilano Cabang Ruas Tol Palembang - Inderalaya. Journal of Software Engineering Ampera, 3(3), 170–185. https://doi.org/10.51519/journalsea.v3i3.267
  43. Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961
  44. Pujeri, Dr. U., & Pujeri, Dr. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.E5980.018520
Read More

References


Sun, P. J. (2019). Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access, 7, 147420–147452. https://doi.org/10.1109/ACCESS.2019.2946185

Mondal, S.K., Mukhopadhyay, I., Dutta, S. (2020). Review and Comparison of Face Detection Techniques. In: Chakraborty, M., Chakrabarti, S., Balas, V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_1

Hidayat, T., & Mahardiko, R. (2020). A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing. International Journal of Artificial Intelligence Research, 4(1). https://doi.org/10.29099/ijair.v4i1.154

Adil Yazdeen, A. ., Zeebaree , S. R. M. ., Mohammed Sadeeq, M., Kak, S. F. ., Ahmed, O. M. ., & Zebari, R. R. (2021). FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review. Qubahan Academic Journal, 1(2), 8–16. https://doi.org/10.48161/qaj.v1n2a38

Machin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and security in cognitive cities: A systematic review. In Applied Sciences (Switzerland) (Vol. 11, Issue 10). MDPI AG. https://doi.org/10.3390/app11104471

Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003

A. R. Sai, J. Buckley and A. Le Gear, "Privacy and Security Analysis of Cryptocurrency Mobile Applications," 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 2019, pp. 1-6, doi: 10.1109/MOBISECSERV.2019.8686583.

Dave, R., R Sowells Boone, E., & Roy, K. (2019). Efficient Data Privacy and Security in Autonomous Cars. Journal of Computer Sciences and Applications, 7(1), 31–36. https://doi.org/10.12691/jcsa-7-1-5

Malik, S., Khattak, H. A., Ameer, Z., Shoaib, U., Rauf, H. T., & Song, H. (2021). Proactive Scheduling and Resource Management for Connected Autonomous Vehicles: A Data Science Perspective. IEEE Sensors Journal, 21(22), 25151–25160. https://doi.org/10.1109/JSEN.2021.3074785

Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. In Egyptian Informatics Journal (Vol. 22, Issue 2, pp. 177–183). Elsevier B.V. https://doi.org/10.1016/j.eij.2020.07.003

Alqadi, Z., Abu-Faraj, M., & Alqadi, Z. A. (2021). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Improving the Efficiency and Scalability of Standard Methods for Data Cryptography Mua’ad. IJCSNS International Journal of Computer Science and Network Security, 21(12). https://doi.org/10.22937/IJCSNS.2021.21.12.61

Navid Bin Anwar, M., Hasan, M., Hasan, M., Loren, J. Z., & Tanjim Hossain, S. M. (2019). Comparative Study of Cryptography Algorithms and Its’ Applications. In International Journal of Computer Networks and Communications Security (Vol. 7, Issue 5). www.ijcncs.org

Benssalah, M., Rhaskali, Y., & Drouiche, K. (2021). An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications, 80(2), 2081–2107. https://doi.org/10.1007/s11042-020-09775-9

Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73–80. https://doi.org/10.1109/TSMC.2019.2903785

Wahab, O. F. A., Khalaf, A. A. M., Hussein, A. I., & Hamed, H. F. A. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805–31815. https://doi.org/10.1109/ACCESS.2021.3060317

Hureib, E., Gutub, A., bin Hureib, E. S., & Gutub, A. A. (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography Steganography and Secret sharing View project Cryptography and Steganography View project Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. In IJCSNS International Journal of Computer Science and Network Security (Vol. 20, Issue 8). https://www.researchgate.net/publication/344311992

Alyousuf, F. Q., Qasim, F., Al-Yousuf, A., & Din, R. (2020). Review on secured data capabilities of cryptography, steganography, and watermarking domain Topic identification using filtering and rule generation algorithm for textual document View project The modeling of E-Supervised (E-SUV) for distance learning centre View project Review on secured data capabilities of cryptography, steganography, and watermarking domain. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), 1053–1059. https://doi.org/10.11591/ijeecs.v17.i2.pp1053-1059

Alqad, Z., Majid Oraiqat, ;, Almujafet, ; Hisham, Al-Saleh, S., Hind, ;, Husban, A., & Al-Rimawi, S. (2019). International Journal of Computer Science and Mobile Computing A New Approach for Data Cryptography. In International Journal of Computer Science and Mobile Computing (Vol. 8, Issue 9). www.ijcsmc.com

Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009

Abu-Faraj, M. M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement Du Signal, 39(1), 173–178. https://doi.org/10.18280/ts.390117

Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95 95 Table. International Journal of Engineering and Advanced Technology, 9(5), 1144–1148. https://doi.org/10.35940/ijeat.E9941.069520

Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4). https://doi.org/10.1088/1742-6596/1918/4/042009

Voleti, L., Balajee, R. M., Vallepu, S. K., Bayoju, K., & Srinivas, D. (2021). A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm. Proceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021, 1005–1010. https://doi.org/10.1109/ICAIS50930.2021.9395794

Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961

Sermeno, J. P., Secugal, K. A. S., & Mistio, N. E. (2021). Modified Vigenere cryptosystem: An integrated data encryption module for learning management system. International Journal of Applied Science and Engineering, 18(4(Special Issue)), 1–10. https://doi.org/10.6703/IJASE.202106_18(4).003

Banday, S.A., Pandit, M.K., Khan, A.R. (2021). Securing Medical Images via a Texture and Chaotic Key Framework. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_1

Politeknik Ganesha Medan, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. International Journal of Information System & Technology Akreditasi, 4(1), 471–481. https://doi.org/10.30645/ijistech.v4i1.85

Kumar Mittal, V., Mukhija, M., & Tech, M. (2019). Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique the Creative Commons Attribution License (CC BY 4.0). International Journal of Trend in Scientific Research and Development (IJTSRD) International Journal of Trend in Scientific Research and Development, 5, 1936–1939. https://doi.org/10.31142/ijtsrd27878

Khasanah, Nguyen, P. T., Gunawan, G., & Rahim, R. (2020). Three-pass protocol scheme on vigenere cipher to avoid key Distribution. Journal of Critical Reviews, 7(1), 68–71. https://doi.org/10.22159/jcr.07.01.13

Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2023). Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation. Wireless Personal Communications, 129(1), 271–284. https://doi.org/10.1007/s11277-022-10097-2

Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021). A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher. Journal of Physics: Conference Series, 1997(1). https://doi.org/10.1088/1742-6596/1997/1/012021

Rizal, A., Utomo, D. S. B., Rihartanto, R., Hiswati, M. E., & Haviluddin, H. (2019). Modified key using multi-cycle key in vigenere cipher. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 2600–2606. https://doi.org/10.35940/ijrte.B1313.0982S1119

S. Vatshayan, R. A. Haidri and J. Kumar Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," 2020 International Conference on Computational Performance Evaluation (ComPE), Shillong, India, 2020, pp. 848-852, doi: 10.1109/ComPE49325.2020.9199997.

Uniyal, N., Dobhal, G., Rawat, A., & Sikander, A. (2021). A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Personal Communications, 119(2), 1577–1587. https://doi.org/10.1007/s11277-021-08295-5

Ahamed, B. B., & Krishnamoorthy, M. (2022). SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm. Journal of the Operations Research Society of China, 10(4), 835–848. https://doi.org/10.1007/s40305-020-00320-x

A. Nuhi, A. Memeti, F. Imeri and B. Cico, "Smart Attendance System using QR Code," 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 2020, pp. 1-4, doi: 10.1109/MECO49872.2020.9134225.

Tiantian Wang , Fei Jia, The impact of health QR code system on older people in China during the COVID-19 outbreak, Age and Ageing, Volume 50, Issue 1, January 2021, Pages 55–56, https://doi.org/10.1093/ageing/afaa222

A. G. Khan, A. H. Zahid, M. Hussain and U. Riaz, "Security Of Cryptocurrency Using Hardware Wallet And QR Code," 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-10, doi: 10.1109/ICIC48496.2019.8966739.

Dey, S., Saha, S., Singh, A. K., & McDonald-Maier, K. (2021). FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063486

Mohammed Ali, A., & Farhan, A. K. (2020). Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access, 8, 27448–27458. https://doi.org/10.1109/ACCESS.2020.2971779

Putra, I. P., Witriyono, H. ., Rifqo, M. H. ., & Muntahanah, M. (2022). Utilization of Base64 Encryption Repetition for QR Code Presence on Online Attendance. Jurnal Komputer, Informasi Dan Teknologi (JKOMITEK), 2(2), 519–528. https://doi.org/10.53697/jkomitek.v2i2.942

Ichsan, M., & Hutrianto, H. (2022). Implementasi Algoritma Vignere Chiper Berbasis QRCode Untuk Absensi Pegawai PT. Delameta Bilano Cabang Ruas Tol Palembang - Inderalaya. Journal of Software Engineering Ampera, 3(3), 170–185. https://doi.org/10.51519/journalsea.v3i3.267

Hameed, T. H., & Sadeeq, H. T. (2022). Modified Vigenère cipher algorithm based on new key generation method. Indonesian Journal of Electrical Engineering and Computer Science, 28(2), 954–961. https://doi.org/10.11591/ijeecs.v28.i2.pp954-961

Pujeri, Dr. U., & Pujeri, Dr. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.E5980.018520

Author Biography

Rabei Raad Ali, Northern Technical University

Assistant professor, Scopus index : 4

Download this PDF file
PDF
Statistic
Read Counter : 38 Download : 20

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License