ISSN 2394-5125
 

Review Article 


Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono.

Abstract
Data theft is the process of stealing digital information from victims who do not know it in order to jeopardize privacy or obtain confidential information. Data theft becomes a problem for individual computer users, as well as large companies. Every individual has not covered the possibility of information theft because of someone's negligence. In safeguarding data, we need a technique that can help someone in keeping the data a secret. Data theft is unavoidable, but data security can be improved to prevent data misuse. Vigenere algorithm, which is a cryptographic technique, can help secure data from data misuse. This algorithm works by shifting each character in the plaintext for the key provided. The key used can be a series of characters or are words that are difficult to guess by people who want to commit a crime. Implementing the Vigenere Cipher algorithm will guarantee data security.

Key words: Vigenere Cipher, encryption, decryption, algorithm


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Andini Dani Achmad
Articles by Ayu Aryista Dewi
Articles by Muhammad Roy Purwanto
Articles by Phong Thanh Nguyen
Articles by Imam Sujono
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. JCR. 2020; 7(1): 76-79. doi:10.22159/jcr.07.01.15


Web Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. http://www.jcreview.com/?mno=302645138 [Access: September 14, 2020]. doi:10.22159/jcr.07.01.15


AMA (American Medical Association) Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. JCR. 2020; 7(1): 76-79. doi:10.22159/jcr.07.01.15



Vancouver/ICMJE Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. JCR. (2020), [cited September 14, 2020]; 7(1): 76-79. doi:10.22159/jcr.07.01.15



Harvard Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono (2020) Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. JCR, 7 (1), 76-79. doi:10.22159/jcr.07.01.15



Turabian Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. 2020. Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. Journal of Critical Reviews, 7 (1), 76-79. doi:10.22159/jcr.07.01.15



Chicago Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. "Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission." Journal of Critical Reviews 7 (2020), 76-79. doi:10.22159/jcr.07.01.15



MLA (The Modern Language Association) Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono. "Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission." Journal of Critical Reviews 7.1 (2020), 76-79. Print. doi:10.22159/jcr.07.01.15



APA (American Psychological Association) Style

Andini Dani Achmad, Ayu Aryista Dewi, Muhammad Roy Purwanto, Phong Thanh Nguyen, Imam Sujono (2020) Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission. Journal of Critical Reviews, 7 (1), 76-79. doi:10.22159/jcr.07.01.15