Integrasi Seni Kuno dan Tantangan Enkripsi Modern melalui Kajian Ulang Teknik Kriptanalisis Al-Kindi
DOI:
https://doi.org/10.15575/hm.v7i2.27845Abstract
This study aims to review the cryptanalysis techniques introduced by Al-Kindi, an ancient cryptographic figure, by relating them to the modern encryption challenges faced today. The method used involves an analysis of the literature on Al-Kindi's works which are relevant in cryptanalysis, such as “Risalah al-Mu'atabarah". In addition, the ancient cryptanalysis techniques introduced by Al-Kindi are also analyzed in the context of complex modern encryption challenges. The results of this study indicate that the cryptographic principles proposed by Al-Kindi, such as the substitution method, the transposition method, and the need for a strong secret key, still have relevance in overcoming modern encryption challenges. The method of substitution and transposition introduced by Al-Kindi can be adapted in letter frequency analysis and structural analysis to decode complex codes. The principle of needing a strong secret key also remains important in protecting data and communications in the modern digital era. The cryptographic principles introduced by Al-Kindi can be applied in overcoming the complexity of the current encryption system. This research provides new insights into how to apply ancient cryptographic principles to crack complex codes and improve information security in the ever-evolving digital age.References
Al-kazaz, Noor R. Compression-Based Methods for the Automatic Cryptanalysis of Classical Ciphers College of Environmental Sciences and Engineering Compression-Based Methods for the Automatic Cryptanalysis of Classical Noor R . Al-Kazaz. Bangor University, 2020.
Albert Ginting, R. Rizal Isnanto, and Ike Pertiwi Windasari. “Implementasi Algoritma Kriptografi RSA Untuk Enkripsi Dan Dekripsi Email.†Jurnal Teknologi Dan Sistem Komputer 3, no. 2 (2015): 253–58. https://jtsiskom.undip.ac.id/article/view/12009.
Bawono, Hernata Rio Cahyo. “Kriptanalisis Pada Algoritma Cipher Algorithm.†Skripsi, 2015.
Dewanto, Ragil Aria, and Aries Suharso. “Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local.†Jurnal Ilmiah Wahana Pendidikan 8, no. 16 (2022): 467–76. https://doi.org/10.5281/zenodo.7068003.
Fajrin, Ricky Maulana, Jalan Kolonel, Wahid Udin, Kayuara Sekayu, and Musi Banyuasin. “Keamanan Data Pada Cloud Computing.†Seminar Nasional Teknologi Informasi, Komunikasi Dan Managemen Palembang-Indonesia 23 (2014).
Faqih, Fauziah Nur, Muhlis Tahir, Zarwanda Ashfarina, and Robby Irsyad. “Efektivitas Peningkatan Keamanan Login Pada Website Menggunakan Enkripsi Caesar Chipper Pendahuluan Peningkatan Teknologi Informasi Dan Internet Telah Membuat Banyak Orang Bergantung.†Adijaya Jurnal Multidisiplin 01, no. 02 (2023): 354–62.
Huda, Choirul, Dadang Iskandar Mulyana, Aji Dwi Prasetyo, and Ali Yafi Zulkarnain. “Implementasi Algoritma One Time Mengggunakan Algoritma Chiper Transposition Sebagai Pengamanan Rahasia Pesan.†Jurnal J-COM (Jurnal … 03, no. 01 (2022): 40–48. https://ejurnalunsam.id/index.php/jicom/article/view/4997%0Ahttps://ejurnalunsam.id/index.php/jicom/article/download/4997/3171.
Kaniawulan, Ismi, M Rafi Muttaqin, and Dhiya Ulhaq. “Sistem Manajemen Pengetahuan Forum Diskusi Dosen Knowledge Management System of Lecturer Discussion Forum.†Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK) 7, no. 1 (2020): 51–58. https://doi.org/10.25126/jtiik.202071258.
Kehista, Adisya Poeja, Achmad Fauzi, Annisa Tamara, Ivanida Putri, and Nurul Afni. “Analisis Keamanan Data Pribadi Pada Pengguna E-Commerce : Ancaman , Risiko , Strategi Kemanan ( Literature Review )†4, no. 5 (2023): 625–32.
Kusumaningtyas, Juwita Artanti. “Analisa Algoritma Ciphers Transposition : Study Literature.†Multimatrix I, no. 1 (2018): 1–12. http://jurnal.unw.ac.id:1254/index.php/mm/article/view/152/106.
Laskari, Elena C., G. C. Meletiou, Y. C. Stamatiou, and M. N. Vrahatis. Cryptography and Cryptanalysis through Computational Intelligence. Studies in Computational Intelligence. Vol. 57, 2007. https://doi.org/10.1007/978-3-540-71078-3_1.
Mahto, Dindayal, and Dilip Kumar Yadav. “RSA and ECC,A Comparative Analysis.Pdf.†International Journal of Applied Engineering Research 12, no. 19 (2017): 9053–61.
Ningrum, Desi Fitriani, Muhlis Tahir, Wahyu Dwi Angelina, Eliza Permatasari, Fifi Rinazah Rofiq, Miftakhul Hidayati, Fatimatus Sahroh, Andi Setiawan, and Desifitriani733@gmail.com. “Implementasi Keamanan Data Menggunakan Kriptografi Caesar Chiper Desi.†Adijaya Jurnal Multidisiplin 01, no. 02 (2016): 1–23.
Oktavani, Selli, Fahrizal Rizky, and Indra Gunawan. “Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar ( AES ) JURNAL MEDIA INFORMATIKA [ JUMIN ]†4 (2023): 97–101.
Purnamasari, D, A K Dewi, and A N Trisetiyanto. “Analisis Performansi Kriptografi Berbasis Caesar Cipher Untuk Keamanan Data Menggunakan Python Pada Tembang Macapat.†Journal of Systems 1, no. 2 (2021): 50–54. https://www.e-journal.ivet.ac.id/index.php/jsite/article/view/2079.
Raodia, Raodia. “Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime).†Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah Dan Hukum 6, no. 2 (2019): 39. https://doi.org/10.24252/jurisprudentie.v6i2.11399.
Rauf, Budi Wijaya. “Kombinasi Steganografi Bit Matching Dan Kriptografi Playfair Cipher, Hill Cipher Dan Blowfish.†Jurnal Teknologi Informasi 4, no. 2 (2020): 228–33. https://doi.org/10.36294/jurti.v4i2.1346.
Renaldy, Aldi, Achmad Fauzi, An Nisaa Shabrina, and Hanny Novita Ramadhan. “Peran Sistem Informasi Dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan.†Jurnal Ilmu Multidisiplin 2, no. 1 (2023): 15–22.
Riadi, Muchlisin. “Pengertian, Sejarah Dan Jenis Kriptografi.†Kajian Pustaka, 2014. https://www.kajianpustaka.com/2014/01/pengertian-sejarah-dan-jenis-kriptografi.html.
Sadikin, Rifki. Kriptografi Untuk Keamanan Jaringan Dan Implementasinya Dalam Bahasa Java. Yogyakarta: Penerbit Andi, 2012.
Sulistyo, Budi. Kriptanalisis Cipher Blok Berdasarkan Permainan Kaotik. Vol. 33204013. Bandung: INSTITUT TEKNOLOGI BANDUNG, 2009.
Suyanto, S. “Keamanan Database Menggunakan Metode Enkripsi.†Jurnal Ilmiah Matrik, no. 12 (2012): 137–50.
Utama, Micky Yudi. “Penerapan Matriks Dalam Kriptografi Hill Cipher.†Informatika ITB, 2016.
Wiharto, Yudi, and Ari Irawan. “Enkripsi Data Menggunakan AES 256.†Jurnal Kilat 7, no. 2 (2018): 91–99.
Yonathan, Febri Dwinata, Helfi Nasution, and Heri Priyanto. “Aplikasi Pengaman Dokumen Digital Menggunakan Algoritma Kriptografi Hybrid Dan Algoritma Kompresi Huffman.†Jurnal Edukasi Dan Penelitian Informatika (JEPIN) 7, no. 2 (2021): 181. https://doi.org/10.26418/jp.v7i2.47077.
Zaini, Ahmad. “Implementasi Algoritma Super Enkripsi Pada Pengaman Pesan Berbentuk Teks.†Skripsi. UNIVERSITAS ISLAM NEGERI MAULANA MALIK IBRAHIM, 2021.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).