PENGEMBANGAN DOUBLE ENKRIPSI ALGORITMA VIGINERE CHIPHER DAN TRIPLE CULUMNER UNTUK PENGAMANANFILE GAMBAR
Main Article Content
Abstract
Data security, particularly for image files, is increasingly important in the digital era to protect information from unauthorized access and other threats. This study proposes a combination of the Vigenère Cipher and Triple Columnar Transposition algorithms for securing image files. The Vigenère Cipher algorithm encodes data through polyalphabetic substitution, while the Triple Columnar Transposition scrambles the data sequence to enhance confidentiality. The proposed encryption system employs a super encryption approach, where data is encrypted in layers using both algorithms. The research results show that this method improves data efficiency and security against cryptanalysis attacks while preserving the integrity of image files. Therefore, this approach is expected to provide a significant solution for securing digital data in various applications.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
[1] S. Sinurat and Maranatha Pasaribu, “Text Encoding Using Cipher Block Chaining Algorithm,” J. Info Sains Inform. dan Sains, vol. 11, no. 2, pp. 13–17, 2021, doi: 10.54209/infosains.v11i2.42.
[2] N. Hapifah Purba, “Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text,” Bull. Comput. Sci. Res., vol. 2, no. 2, pp. 47–52, 2022, doi: 10.47065/bulletincsr.v2i2.155.
[3] M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i01.1381.
[4] J. H. Sinaga, M. Pangaribuan, F. Fazly, I. Rivaldo, and I. Gunawan, “Penerapan Enkripsi Dan Deskripsi Menggunakan Algoritma Data Encryption Standard Dengan Pemograman Matlab,” J. Media Inform., vol. 4, no. 1, pp. 63–69, 2022, doi: 10.55338/jumin.v4i1.468.
[5] M. Hidayat, M. Tahir, A. Sukriyadi, A. Sulton, C. A. S. A, and S. A. F, “Penerapan kriptografi,” vol. 2, no. 3, pp. 35–41, 2023.
[6] A. Ariska and W. Wahyuddin, “Penerapan Kriptografi Menggunakan Algoritma Des (Data Encryption Standard),” J. Sintaks Log., vol. 2, no. 2, pp. 9–19, 2022, doi: 10.31850/jsilog.v2i2.1734.
[7] L. Silalahi and A. Sindar, “Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 2, pp. 182–186, 2020, doi: 10.32672/jnkti.v3i2.2413.