Hybrid Cryptosystem Analysis by Using The Combination of Vigenere Cipher and RSA for Text Security


  • Jamaludin Jamaludin Information Technology, Politeknik Ganesha Medan, Indonesia
  • Romindo Romindo Information Technology, Politeknik Ganesha Medan, Indonesia




Cryptography, Hybrid Cryptosystem, Vegenere Cipher, RSA


The development of Information and Communication Technology (ICT) brought many benefits to the needs of human life, especially the needs for the information which is increasingly obtained easily. This is in line with the need for information security from parties who want to get important data so that it can harm the owner of the source data. One of the data safeguards used is cryptography. Once the importance of data security, almost all activities of human life cannot be separated from cryptography.  According to the key used, cryptography can be divided into two, namely: symmetric cryptography and asymmetric cryptography, which has its own advantages and disadvantages. The objective of this research is to analyze through the calculation results so that they can be applied to overcome the weaknesses that occur from the two types of cryptography. The hybrid cryptosystem coding method is always used to overcome the weaknesses of the two cryptographs. The coding process in this research uses two cryptographic algorithms. They are the Vigenere Cipher algorithm as an example of a symmetrical algorithm and the RSA (Rivest Shamir Adleman) algorithm, which is an example of an asymmetric algorithm. The result of the research on the calculation shows that there is increased security in the encryption because there will be two encodings, namely the coding of the messages by the Vigenere Cipher cryptographic algorithm and key coding by the RSA cryptographic algorithm


Ariyus, D. (2008) Pengantar ilmu kriptografi: teori analisis & implementasi. Yogyakarta: ANDI. Retrieved at: https://books.google.co.id/books?id=3SSTJONEmX0C&printsec=frontcover&hl=id#v=onepage&q&f=false.

Gunawan, I. (2018) “Kombinasi algoritma Caesar cipher dan algoritma RSA untuk pengamanan file dokumen dan pesan teks,” Infotekjar, 2(1), pp. 124–129.

Gupta, R. K. dan Singh, P. (2013) "A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network," 3(8), pp. 108–115.

Jamaludin (2019) “Rancang Bangun Kombinasi Hill Cipher dan RSA Menggunakan Metode Hybrid Cryptosystem,” Sinkron, 2(April 2018). Retrieved at: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/139.

Rakhman, A. A. dan Kurniawan, A. W. (2015) “Implementasi Algoritma Kriptografi Rivest Shamir Adleman ( Rsa ) Dan Vigenere Cipher Pada Gambar Bitmap 8 Bit,” Techno.COM, 14(2), pp. 122–134, ISSN:2356-2579. Retrieved at: http://publikasi.dinus.ac.id/index.php/technoc/article/view/886/657.

Rifki Sadikin (2012) Kriptografi untuk keamanan jaringan. Yogyakarta: Penerbit ANDI.

Rinaldi, M. (2006) Kriptografi. Bandung: Informatika. Retrieved at: https://scholar.google.com/scholar?hl=th&as_sdt=0,5&cluster=16551445928354209324.

Romindo, R. (2018) “Analisa Perbandingan Algoritma Monoalphabetic Cipher Dengan Algoritma One Time Pad Sebagai Pengamanan Pesan Teks,” Sinkron, 2(April 2018). Retrieved at: http://jurnal.polgan.ac.id/index.php/sinkron/article/view/123.