Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse

  • Eko Prasetyo Universitas Harapan Medan
  • Yessi Fitri Annisah Lubis Universitas Harapan Medan
Keywords: Optimizing, Cryptography, Playfair Cipher, Reverse, Morse Code


Improving the security of cryptosystems is a challenge that attracts many researchers to propose and develop new cryptosystems to achieve cryptographic goals. In addition to implementing new cryptographic algorithms, the way that can be done is to modify, combine algorithms or even add other methods to improve existing cryptographic algorithms. Playfair Cipher is a cryptographic algorithm that has long been known and is still widely used and studied today. To optimize or strengthen the confidentiality of data from encryption (ciphertext) using the Playfair Cipher algorithm, research will be carried out by adding reverse operations and conversion into Morse code. This research produces a desktop-based application that can be used in optimizing the security of the encryption results of the Playfair Cipher cryptographic algorithm. From the test results on 10 data samples, it shows that the frequency of characters from the results of reverse and encryption (ciphertext) changes in value constantly along with the addition of the number of characters in the test text. However, after being converted into Morse code, it does not show any pattern of connection between the results of the Morse code conversion and plaintext. This proves that the encryption results after being converted into Morse code can increase (optimize) the security of the Playfair Cipher algorithm, because it will produce more random text and will not show patterns of connection between the results of the conversion into Morse code and the original text (plaintext).


Download data is not yet available.


[1] F. Azmi and R. Anugrahwaty, “Analisis Matriks 5x7 Pada Kriptografi Playfair Cipher,” J. Penelit. Tek. Inform., vol. 1, no. 2, pp. 27–30, 2017, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/32
[2] M. Mesran and S. D. Nasution, “Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 6, pp. 7–12, 2020, doi: 10.29207/resti.v4i6.2730.
[3] I. Darmayanti, D. N. Astrida, and D. Ariyus, “Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse,” J. Ilm. IT CIDA, vol. 4, no. 1, pp. 39–47, 2018, doi: 10.55635/jic.v4i1.78.
[4] S. D. Surbakti, “Implementasi Algoritma Playfair Cipher pada Penyandian Data,” J. Tek. Inform. Unika St. Thomas, vol. 4, no. 2, pp. 166–123, 2019, doi: 10.17605/jti.v4i2.42.
[5] M. S. Yousif, R. K. Salih, and N. M. G. Alsaidi, “A New Modified Playfair Cipher,” AIP Conf. Proc., vol. 2086, no. April, pp. 2–6, 2019, doi: 10.1063/1.5095132.
[6] D. Susanti, “Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks,” Indones. J. Data Sci., vol. 1, no. 1, pp. 11–18, 2020, doi: 10.33096/ijodas.v1i1.4.
[7] M. Syahrizal, M. Murdani, S. D. Nasution, M. Mesran, R. Rahim, and A. P. U. Siahaan, “Modified Playfair Cipher Using Random Key Linear Congruent Method,” J. Online Jar. COT POLIPD, vol. 8, no. 1, pp. 45–49, 2017, [Online]. Available: https://www.geocities.ws/apacc/paper8_syarizalscience_irstc_vol9.pdf
[8] R. A. Sukmawati, A. Riski, and A. Kamsyakawuni, “Perbandingan Playfair Cipher Dengan 3D Playfair Cipher Pada Pengamanan Citra,” Maj. Ilm. Mat. dan Stat., vol. 21, no. 1, pp. 15–24, 2021, doi: 10.19184/mims.v21i1.23116.
[9] A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sink. (Publikasi J. Penelit. Tek. Inform., vol. 2, no. 2, pp. 13–17, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/index
[10] Y. Permanasari and E. Harahap, “Kriptografi Polyalphabetic,” J. Mat., vol. 17, no. 1, pp. 31–34, 2018, doi: 10.29313/jmtm.v17i1.4065.
[11] R. K. Hondro, “Modifikasi Platform Kunci Algoritma Playfair Untuk Meningkatkan Nilai Confusion Pada Ciphertext,” J. Comput. Syst. Informatics, vol. 1, no. 2, pp. 76–82, 2020, [Online]. Available: https://ejurnal.seminar-id.com/index.php/josyc/article/view/102
[12] S. Murdowo, “Manual Perhitungan Menggunakan Kriptografi Klasik Playfair Chiper,” J. INFOKAM, vol. XVI, no. 19, 2020, doi: https://doi.org/10.53845/infokam.v16i1.217.
[13] M. Z. Siambaton and A. Muhazir, “Modifikasi Algoritma Playfair Cipher Dengan Pengurutan Array Pada Matriks,” J. Ilmu Komput. dan Inform., vol. 2, no. 1, pp. 66–71, 2018.
[14] A. Ridho, C. Mutia, and A. P. Sinaga, “Analisis Enkripsi dan Dekripsi Cipher Teks Menggunakan Kombinasi Gronsfeld Cipher Dengan Reverse Cipher,” J. Tek. Inform. Kaputama, vol. 6, no. 1, 2022, [Online]. Available: https://jurnal.kaputama.ac.id/index.php/JTIK/article/view/689
[15] L. Andriani, Rihartanto, and A. B. W. Putra, “Optimasi Vigenere Cipher Menggunakan Bitswap dan Transposisi Acak pada Citra RGB,” Techno.Com, vol. 19, no. 2, pp. 168–177, 2020, doi: 10.33633/tc.v19i2.3322.
[16] A. Wijaya, E. Kwok, and H. Agung, “Aplikasi Morse Code Translator Metode Klasifikasi Euclidean Distance dengan Algoritma Ocrchie untuk Menerjemahkan Kode Morse,” KALBISCIENTIA J. Sains dan Teknol., vol. 5, no. 1, pp. 30–34, 2018, [Online]. Available: http://research.kalbis.ac.id/Research/Files/Article/Full/5GJT98A5SN6NP8S131Z5HQAM3.pdf
[17] D. N. Triwibowo, Purwono, I. A. Ashari, A. S. Sandi, and Y. F. Rahman, “Enkripsi Pesan Menggunakan Algoritma Linear Congruential Generator (LCG) dan Konversi Kode Morse,” Bul. Ilm. Sarj. Tek. Elektro, vol. 3, no. 3, pp. 194–201, 2022, doi: 10.12928/biste.v3i3.5546.
How to Cite
Prasetyo, E., & Lubis, Y. F. A. (2023, May 20). Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse. JiTEKH, 11(1), 41-50. https://doi.org/https://doi.org/10.35447/jitekh.v11i1.703