Keyword Security Implementation Based on Hill Cipher Optimized Using Genetic Algorithms


Abstract
In the process of exchanging data and information, the most important task is to maintain data and information security and reach out to interested parties. One way this can be achieved is through encryption, a process better known as cryptography. Cryptography can scramble messages so that, even if intercepted, the message cannot be immediately read. One example of an encryption algorithm is the Hill Cipher. The Hill Cipher uses an m-by-m-sized matrix as the key for the encryption and decryption process, making it a challenging algorithm to crack. The key provided for the Hill Cipher encryption and decryption process cannot be arbitrary. The keys with mismatched determinants cannot be used, as they can prevent the encrypted message from being restored to its original form. Optimization can be carried out to overcome these obstacles using a genetic algorithm. Genetic algorithms can determine the keys to encrypt and decrypt the Hill Cipher. A key with the appropriate composition for the Hill Cipher will be obtained through the genetic algorithm's evaluation function. This research aims to enhance message security by using the correct composition to generate Hill Cipher encryption and decryption keys. The research results indicate that out of 10 tests conducted with different lengths of original text, eight succeeded, while two failed to complete the encryption and decryption process.
Downloads
References
M.M. Amin., “Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks,” Jurnal Pseudocode, vol. III, no. 2, pp. 129–136, 2016.
B.S. Hasugian. , “Peranan Kriptografi Sebagai Keamanan Sistem Informasi Pada Usaha Kecil Dan Menengah” Jurnal Warta, No 53, 2017, DOI: https://doi.org/10.46576/wdw.v0i53.269, ISSN. 1829 – 7463.
F.N. Pabokory., Astuti, I.F. and Kridalaksana, A.H., “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan Fil Dokumen Menggunakan Algoritma Advanced Encryption Standard”, Jurnal Informatika Mulawarman, Vol. 10, No. 1, pp. 20–31, 2015.
S. Yunita, P. Hasan and D. Ariyus., “Modifikasi Algoritma Hill Cipher dan Twofish Menggunakan Kode Wilayah Telepon,” Sisfotenika, vol. 9, no. 2, pp. 213–224, 2019.
P. Priyono. , “Penerapan Algoritma Caesar Cipher Dan Algoritma Vigenere Cipher Dalam Pengamanan Pesan Teks,” J. Ris. Komput., vol. 3, Nomor:, no. Algoritma Caesar Cipher, pp. 351–356, 2016.
R. Wardhani, S.R. Nurshiami and N. Larasati. , “Komputasi Enkripsi Dan Dekripsi Menggunakan Algoritma Hill Cipher,” J. Ilm. Mat. dan Pendidik. Mat., vol. 14, no. 1, p. 45, 2022, doi: 10.20884/1.jmp.2022.14.1.5727.
W.A. Puspaningrum, A. Djunaidy and R.A. Vinarti. , “Penjadwalan Mata Kuliah Menggunakan Algoritma Genetika di Jurusan Sistem Informasi ITS,” vol. 2, no. 1, pp. 127–131, 2013.
A. Laksono, M. Utami and Y. Sugiarti. , “Sistem Penjadwalan Kuliah Menggunakan Metode Algoritma Genetika (Studi Kasus: Fakultas Kedokteran dan Kesehatan Universitas Muhammadiyah Jakarta),” Stud. Inform. J. Sist. Inf., vol. 9, no. 2, pp. 177–188, 2018.
L. Tambunan., “Implementasi Algoritma Genetika dalam Pembuatan Jadwal Kuliah,” Jar. Sist. Inf. Robot., vol. 1, no. 01, pp. 1–7, 2017.
A.P.U. Siahaan., “Algoritma Genetika Untuk Pembentukan Kunci Matriks 3 X 3 Pada Kriptografi Hill Cipher”, Seminar Nasional Sains dan Teknologi 2016, Fakultas Teknik Universitas Muhammadiyah Jakarta, p-ISSN : 2407 –1846.
B.V. Indriyono, et al, "Comparative Analysis of the Performance Testing Results of the Backtracking Algorithm and Genetics in Solving Sudoku Games", International Journal of Artificial Intelligence & Robotics (IJAIR), Vol.5, No.1, 2023, pp.29-35, 2023.
A. Hidayat and T. Alawiyah., "Enkripsi dan Dekripsi Teks menggunakan Algoritma Hill Cipher dengan Kunci Matriks Persegi Panjang", Jurnal Matematika Integratif, Volume 9 No 1, April 2013, pp 39 - 51, 2013.
P. Hasan, S. Yunita, D.Ariyus., "Implementasi Hill Cipher Pada Kode Telepon dan Five Modulus Method dalam Mengamankan Pesan", JURNAL SISFOTENIKA, Vol. 10 No. 1, pp. 12-23,2020.
L.J. Pangaribuan., "Kriptografi Hybrida Agloritma Hill Cipher Dan Rivest Shamir Adleman (Rsa) Sebagai Pengembangan Kriptografi Kunci Simetris (STUDI KASUS : Nilai Mahasiswa AMIK MBP)", Jurnal Teknologi Informasi dan Komunikasi, Vol. 7 No.1, pp. 11 – 26, 2018
S.F. Pane, et all, "Implementasi Algoritma Genetika Untuk Optimalisasi Pelayanan Kependudukan", Jurnal Tekno Insentif, Vol. 13, No. 2, pp. 36-43, 2019.
K. Krisnandi and H. Agung., "Implementasi Algoritma Genetika untuk Memprediksi Waktu dan Biaya Pengerjaan Proyek Konstruksi", JURNAL ILMIAH FIFO, Volume IX,No.2, pp. 90-97, 2017.
M.I. Nahwi., "Penyandian Kunci Dengan Optimasi Menggunakan Algoritma Genetika Pada Kunci Enkripsi Kriptografi Hill Cipher", Jurnal & Penelitian Teknik Informatika, Vol. 1, No. 1, pp. 45-50, 2016.
S. Arikunto, Prosedur Penelitian. Jakarta: Rineka cipta, 2019.
I. Saputri, et all,"Pengamanan Pesan Menggunakan Metode Hill Chiper Dalam Keamanan Informasi", Bulletin of Information Technology (BIT), Vol 3, No 4, pp. 341-349, 2022.
A. Serdano, M. Zarlis, Sawaluddin, and D. Hartama, “Pengamanan Pesan Menggunakan Algoritma Hill Cipher Dalam Keamanan Komputer,” J. Mahajana Inf., vol. 4, no. 2, pp. 1–5, 2019.
J.I. Sari., Sulindawaty and H.T. Sihotang., "Implementasi Penyembunyian Pesan Pada Citra Digital dengan Menggabungkan Algoritma Hill Cipher dan Metode Least Significant BIT (LSB)", Jurnal Mantik Penusa, Vol. 1, No. 2,2017.
Forouzan, Behrouz, 2006, Cryptography and Network Security, McGraw-Hill.
Kaharuddin, E. Pawan and D. Ariyus., "Kombinasi Arnold Cat Map dan Modifikasi Hill Cipher Menggunakan Kode Bunyi Beep BIOS PHOENIX", Sisfotenika, vol. 9, no. 2, pp. 159–168, 2019.
M.A. Nasuton, E.V. Haryanto and A. Saleh., "Penerapan Metode Hill Cipher Dan Stream Cipher Dalam Mengamankan Database MySQL", Jurnal FTIK, Vol. 1 No. 1, pp. 532-544, 2020.
L.M.A. Khoirul, W. Wahyu and S. Darma., “Optimasi Penjadwalan Mata Pelajaran Menggunakan Metode Tabu Search (Studi Kasus: SMKN 2 Singosari)”, International Clinical Psychopharmacology, Vol. 22, No.6, pp. 338-347, 2017.
T. Kenedy, N. Nur and Wijono. “Optimasi Penempatan Load Break Switch (LBS) pada Penyulang Karpan 2 Ambon menggunakan Metode Algoritma Genetika”, Electrical, Electronics, Communications, Controls and Informatics System, Vol. 11, No.2, pp. 1-8,2018.
Copyright (c) 2023 Mayang Arinda Yudantiar; Purwanto Purwanto, Sri Winarno

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with International Journal of Artificial Intelligence & Robotics (IJAIR) agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.