Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security

Penulis

  • Fauzul Azmi Universitas Harapan Medan Penulis
  • Tommy Tommy Universitas Harapan Medan Penulis

Kata Kunci:

Cryptography, Hill cipher, Data security, Digital files, Encryption, Key validation, Matrix

Abstrak

Digital file security plays a crucial role in the modern era of rapid information exchange and growing data threats. This study presents the development of a desktop-based file security system that utilizes a random key matrix approach for secure encryption and decryption. The core innovation lies in the validation of randomly generated key matrices to ensure they possess a valid inverse under modulo 256 arithmetic. This validation is critical, as it guarantees that encrypted data can be accurately decrypted using the same key. The system converts digital files into binary blocks, which are then encrypted through matrix multiplication with the validated key. Comprehensive testing was carried out using various file types and sizes to evaluate the system’s robustness, performance, and reliability. The results demonstrate that the application provides an effective method for safeguarding digital files, with improved security due to the randomness and strength of the key generation process. This research contributes significantly to the ongoing advancement of cryptography-based solutions for file protection in desktop environments.

Referensi

R. Dunnill and C. Barham, “Confidentiality and security of information,” Anaesthesia & Intensive Care Medicine, vol. 8, no. 12, pp. 509–512, Dec. 2007, doi: 10.1016/J.MPAIC.2007.09.008.

E. Prasetyo and Y. F. A. Lubis, “Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse,” JiTEKH, vol. 11, no. 1, pp. 41–50, 2023, doi: 10.35447/jitekh.v11i1.703.

W. Rajeh and W. Rajeh, “Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue,” Journal of Information Security, vol. 13, no. 2, pp. 23–42, Feb. 2022, doi: 10.4236/JIS.2022.132002.

S. Shukla, J. P. George, K. Tiwari, and J. V. Kureethara, “Data Security,” SpringerBriefs in Applied Sciences and Technology, pp. 41–59, 2022, doi: 10.1007/978-981-19-0752-4_3.

V. Babak, S. Babak, V. Eremenko, Y. Kuts, and A. Zaporozhets, “Protection of Measurement Information from Unauthorized Access,” pp. 409–458, 2025, doi: 10.1007/978-3-031-89406-0_10.

F. Ruziq, “Analisis Kombinasi Algoritma Data Encryption Standard (DES) dan Algoritma Luc pada Pengamanan File,” 2020, Accessed: Aug. 04, 2025. [Online]. Available: https://repositori.usu.ac.id/handle/123456789/24679

B. K. Laia, “Modifikasi Algoritma Lucifer Dengan Menerapkan Pembangkitan Kunci Berdasarkan Naive Shuffle,” Journal of Informatics, Electrical and Electronics Engineering, vol. 1, no. 3, pp. 110–118, 2022, doi: 10.47065/jieee.v1i3.355.

M. Soni and D. K. Singh, “New directions for security attacks, privacy, and malware detection in WBAN,” Evol Intell, vol. 16, no. 6, pp. 1917–1934, Dec. 2023, doi: 10.1007/S12065-022-00759-2/METRICS.

Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Electronics 2023, Vol. 12, Page 1333, vol. 12, no. 6, p. 1333, Mar. 2023, doi: 10.3390/ELECTRONICS12061333.

F. Azmi and R. Anugrahwaty, “Analisis Matriks 5x7 Pada Kriptografi Playfair Cipher,” Jurnal & Penelitian Teknik Informatika, vol. 1, no. 2, pp. 27–30, 2017.

M. N. Sutoyo et al., “Pengamanan Data Berbasis Hill Cipher dengan Operasi Modulo pada Karakter ASCII,” vol. 23, no. 4, pp. 786–795, 2024.

D. Laoli, B. Sinaga, and A. S. R. M. Sinaga, “Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 4, no. 3, p. 1, 2020, doi: 10.14421/jiska.2020.43-01.

A. H. Hasugian, “Implementasi Algoritma Hill Cipher Dalam Penyandian Data,” Pelita Informatika Budi Darma, vol. IV, no. 2, pp. 115–122, 2013.

D. A. Risdianto and B. N. Prastowo, “Pengembangan True Random Number Generator berbasis Citra menggunakan Algoritme Kaotis,” IJEIS (Indonesian Journal of Electronics and Instrumentation Systems), vol. 10, no. 1, p. 87, 2020, doi: 10.22146/ijeis.36517.

Moh. Wasil, “Implementasi Matriks Dalam Kriptografi Hill Cipher Dalam Mengamankan Pesan Rahasia,” Zeta - Math Journal, vol. 8, no. 2, pp. 71–78, 2023, doi: 10.31102/zeta.2023.8.2.71-78.

Diterbitkan

2025-08-09

Cara Mengutip

Azmi, F., & Tommy, T. (2025). Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security. Journal of Technology and Computer, 2(3), 146-156. https://journal.technolabs.co.id/index.php/jotechcom/article/view/62

Artikel paling banyak dibaca berdasarkan penulis yang sama

<< < 1 2 3 4 5 6 > >>