### Pemanfaatan Kunjungan Pohon Biner Pada Kriptografi Hill Cipher Kunci Matriks Persegi Panjang

Tuti Alawiyah

#### Sari

Abstrak
Kata Kunci: hill cipher, kriptografi, kunjungan pohon biner, matriks persegi panjang, modulo
Abstract
Information security in the process of data exchange is very important. For that we need cryptography that can keep the confidentiality of the information exchanged. Two important processes in cryptography are the encryption process and the description process. In the encryption process the information / message (plaintext) changes into an unintelligible form (ciphertext), whereas the description changes the unintelligible information / message (ciphertext) to its original plain text. Hill cipher is one of the cryptographic algorithms that utilize modulo operation using matrix as key to convert plaintext into ciphertext. In this study the key matrix used is a rectangular matrix by adding the utilization of traverse binary tree at the beginning of the process. Each plaintext character is converted into a decimal number according to the ASCII code minus 32 by modulo 95. The use of a rectangular key matrix makes ciphertext longer than its plaintext so that the information / messages conveyed becomes more disguised, added by the binary visitation operation making the ciphertext more complicated to be solved by crypnatalis.
Keywords: hill cipher, cryptografy, traverse binary tree, rectangular matrix, modulo

PDF

#### Referensi

Muis, S. (2013). Pengantar Kriptografik Kuantum Teknik Enkripsi Masa Depan. Yogyakarta: Graha Ilmu.

Puspita, K., & Wayahdi, M. R. (2015). Analisis Kombinasi Metode Caesar Cipher, Vernam Cipher, dan Hill Cipher Dalam Proses Kriptografi. Seminar Nasional Teknologi Informasi dan Multimedia 2015 (pp. 1-6). Yogyakarta: STMIK AMIKOM Yogyakarta.

Rahman, M. N., Abidin, A. F., Yusof, M. K., & Usop, N. S. (2013). Cryptography: A New Approach of Classical Hill Cipher. International Journal of Security and Its Applications, 179-190.

Sjukani, M. (2012). Struktur Data (Algoritma & struktur Data 2) dengan C, C++. Jakarta: Mitra Wacana Media.

Viswanat, M., & Kumar, R. M. (2015). A Public Key Cryptosystem Using Hiil's Cipher. Journal of Discrete Mathematical Sciences and Cryptography, 129-138.

Wowor, A. D. (2014). Penggunaan Determinan Polinomial Matriks Dalam Modifikasi Kriptografi Hill Cipher.

DOI: https://doi.org/10.31294/ijcit.v2i1.2931