Search Results

Results (4)

Search Parameters:

Author/Affiliation: Rahmat Widia Sembiring
Order results
Results per page
Open AccessArticle
4 Pages, 631 KB Download PDF

A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 31–34, 2017; DOI: 10.25046/aj020506
Abstract:

One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
4 Pages, 566 KB Download PDF

Combination of Caesar Cipher Modification with Transposition Cipher

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 22–25, 2017; DOI: 10.25046/aj020504
Abstract:

The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 827 KB Download PDF

Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 6–12, 2017; DOI: 10.25046/aj020502
Abstract:

Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 234 KB Download PDF

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 1–5, 2017; DOI: 10.25046/aj020501
Abstract:

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026