Implementation of the Autokey Algorithm ASCII Text Cryptography Using JavaFX GUI

Ricky Dirgantara, Hans Valerian Lenice, Lekso Budi Handoko, Wise Herowati

Abstract


The advance of information and communication technology has transformed the world in ways we could never have imagined. From the analog era to the digital age, technology has paved the way for new innovations and discoveries, changing the way we interact, communicate, work, and even play. Data breaches are one of the threats that frequently arise in this era of digital information since the data has great value in enhancing the security of the data we transmit, one of which is using code. There are numerous ways to encode data in cryptography, but one popular technique is Autokey Cipher cryptography. Autokey cipher is a development of vigenere cipher which is a solution to overcome the repetition of certain characters in keys. Autokey operations are performed based on the key length and calculated using the tabula recta of the vigenere cipher, the key from autokey is a combination of plaintext to produce a new key along the plaintext. In this research we built the implementation using Java library JavaFX. The GUI also shows how the autokey cipher works, which will give us an understanding about the encryption and decryption process that is built with ASCII text. And the other additions are the GUI that shows the calculations such as Avalanche Effect (AE), Bit Error Rate (BER), Character Error Rate (CER), and Entropy.

Full Text:

PDF

References


Md. S. Hossain Biswas et al., “A systematic study on classical cryptographic cypher in order to design a smallest cipher,” International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 12, p. p9662, Dec. 2019, doi: 10.29322/ijsrp.9.12.2019.p9662.

R. D. Ainul, S. Wibowo, and I. Zaini, “An Encrypted QR Code Using Layered Numeral Calculation for Low Powered Devices,” in Proceedings of the 4th International Conference on Informatics, Technology andEngineering 2023 (InCITE 2023), 2023, pp. 607–617. doi: 10.2991/978-94-6463-288-0_50.

S. M. Suhael, Z. A. Ahmed, and A. J. Hussain, “Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem,” Baghdad Science Journal, May 2023, doi: 10.21123/bsj.2023.8361.

J. P. Sermeno, K. A. S. Secugal, and N. E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” International Journal of Applied Science and Engineering, vol. 18, no. 4(Special Issue), pp. 1–10, 2021, doi: 10.6703/IJASE.202106_18(4).003.

O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput Sci, vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002.

K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” Journal of Applied Intelligent System, vol. 3, no. 1, pp. 28–38, 2018.

K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 8, pp. 2341–2352, Nov. 2022, doi: 10.1080/09720529.2020.1838744.

C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023, doi: 10.22266/ijies2023.0831.46.

I. Gede, A. Putra Dewangga, T. W. Purboyo, and R. A. Nugrahaeni, “A New Approach of Data Hiding in BMP Image Using LSB Steganography and Caesar Vigenere Cipher Cryptography,” 2017. [Online]. Available: http://www.ripublication.com

L. B. Handoko and C. Umam, “Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB)id 2 *Corresponding author,” 2023.

T. M. Aung, H. H. Naing, and N. N. Hla, “A complex transformation of monoalphabetic cipher to polyalphabetic cipher: (Vigenère-Affine Cipher),” Int J Mach Learn Comput, vol. 9, no. 3, pp. 296–303, Jun. 2019, doi: 10.18178/ijmlc.2019.9.3.801.

L. Budi Handoko and A. Rizqy, “File Cryptography Optimization Based on Vigenere Cipher and Advanced Encryption Standard (AES),” 2023.

S. K. Lakshmanan, L. Shakkeera, and V. Pandimurugan, “Efficient Auto key based Encryption and Decryption using GICK and GDCK methods,” in Proceedings of the 3rd International Conference on Intelligent Sustainable Systems, ICISS 2020, Institute of Electrical and Electronics Engineers Inc., Dec. 2020, pp. 1102–1106. doi: 10.1109/ICISS49785.2020.9316114.

E. Y. Purba, S. Efendi, P. Sirait, and P. Sihombing, “Collaboration of RSA Algorithm Using EM2B Key with Word Auto Key Encryption Cryptography Method in Encryption of SQL Plaintext Database,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Sep. 2019. doi: 10.1088/1742-6596/1230/1/012009.

B. Deepa, V. Maheswari, and V. Balaji, “An Efficient Cryptosystem Using Playfair Cipher Together with Graph Labeling Techniques,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Jul. 2021. doi: 10.1088/1742-6596/1964/2/022016.

P. Pristiwanto, H. Sunandar, and B. Nadeak, “Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process,” Jurnal Info Sains : Informatikan dan Sains, vol. 1, no. 1, pp. 19–23, 2020, [Online]. Available: http://ejournal.seaninstitute.or.id/index.php/InfoSains

M. S. Yousif, R. K. Salih, and N. M. G. Alsaidi, “A new modified playfair cipher,” in AIP Conference Proceedings, American Institute of Physics Inc., Apr. 2019. doi: 10.1063/1.5095132.

N. A. Kako, H. T. Sadeeq, and A. R. Abrahim, “New symmetric key cipher capable of digraph to single letter conversion utilizing binary system,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 2, pp. 1028–1034, May 2020, doi: 10.11591/IJEECS.V18.I2.PP1028-1034.

A. C. Licayan, B. D. Gerardo, and A. A. Hernandez, “Enhancing Playfair Cipher using Seed Based Color Substitution,” in Proceedings, 2020 16th IEEE International Colloquium on Signal Processing & its Application (CSPA 2020), 2020, pp. 242–246.

P. Pristiwanto, H. Sunandar, and B. Nadeak, “Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process,” Jurnal Info Sains : Informatikan dan Sains, vol. 1, no. 2, pp. 19–23, 2020, [Online]. Available: http://ejournal.seaninstitute.or.id/index.php/InfoSains

S. M. Suhael, Z. A. Ahmed, and A. J. Hussain, “Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem,” Baghdad Science Journal, May 2023, doi: 10.21123/bsj.2023.8361.

D. Babuc, “An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic,” International Journal of Computer and Information Engineering, pp. 17–10, 2023, [Online]. Available: https://www.researchgate.net/publication/374589454

E. Hari Rachmawanto et al., “Testing Data Security Using a Vigenere Cipher Based on the QR Code,” Computer Network, Computing, Electronics, and Control Journal, vol. 8, no. 4, pp. 701–708, 2023, doi: 10.22219/kinetik.v8i4.1734.

Permana langgeng wicaksono ellwid putra, C. A. Sari, and F. O. Isinkaye, “Secure Text Encryption for Iot Communication Using Affine Cipher And Diffie-Hellman Key Distribution On Arduino Atmega2560 IotT Devices,” Jurnal Teknik Informatika (Jutif), vol. 4, no. 4, pp. 849–855, Aug. 2023, doi: 10.52436/1.jutif.2023.4.4.1129.


Refbacks

  • There are currently no refbacks.


Flag Counter

 International Journal of Engineering Computing Advanced Research (IJECAR) (e-ISSN : xxxx-xxxxp-ISSN : xxxx-xxxx) is published by ARCES.

 

This journal is under licensed of Creative Commons Attribution 4.0 International License.

Visitor Stats