Integrasi Seni Kuno dan Tantangan Enkripsi Modern melalui Kajian Ulang Teknik Kriptanalisis Al-Kindi


Anatansyah Ayomi Anandari(1*)

(1) Republic of Indonesia Defense University, Indonesia
(*) Corresponding Author

Abstract


This study aims to review the cryptanalysis techniques introduced by Al-Kindi, an ancient cryptographic figure, by relating them to the modern encryption challenges faced today. The method used involves an analysis of the literature on Al-Kindi's works which are relevant in cryptanalysis, such as “Risalah al-Mu'atabarah". In addition, the ancient cryptanalysis techniques introduced by Al-Kindi are also analyzed in the context of complex modern encryption challenges. The results of this study indicate that the cryptographic principles proposed by Al-Kindi, such as the substitution method, the transposition method, and the need for a strong secret key, still have relevance in overcoming modern encryption challenges. The method of substitution and transposition introduced by Al-Kindi can be adapted in letter frequency analysis and structural analysis to decode complex codes. The principle of needing a strong secret key also remains important in protecting data and communications in the modern digital era. The cryptographic principles introduced by Al-Kindi can be applied in overcoming the complexity of the current encryption system. This research provides new insights into how to apply ancient cryptographic principles to crack complex codes and improve information security in the ever-evolving digital age.

Full Text:

PDF

References


Al-kazaz, Noor R. Compression-Based Methods for the Automatic Cryptanalysis of Classical Ciphers College of Environmental Sciences and Engineering Compression-Based Methods for the Automatic Cryptanalysis of Classical Noor R . Al-Kazaz. Bangor University, 2020.

Albert Ginting, R. Rizal Isnanto, and Ike Pertiwi Windasari. “Implementasi Algoritma Kriptografi RSA Untuk Enkripsi Dan Dekripsi Email.” Jurnal Teknologi Dan Sistem Komputer 3, no. 2 (2015): 253–58. https://jtsiskom.undip.ac.id/article/view/12009.

Bawono, Hernata Rio Cahyo. “Kriptanalisis Pada Algoritma Cipher Algorithm.” Skripsi, 2015.

Dewanto, Ragil Aria, and Aries Suharso. “Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local.” Jurnal Ilmiah Wahana Pendidikan 8, no. 16 (2022): 467–76. https://doi.org/10.5281/zenodo.7068003.

Fajrin, Ricky Maulana, Jalan Kolonel, Wahid Udin, Kayuara Sekayu, and Musi Banyuasin. “Keamanan Data Pada Cloud Computing.” Seminar Nasional Teknologi Informasi, Komunikasi Dan Managemen Palembang-Indonesia 23 (2014).

Faqih, Fauziah Nur, Muhlis Tahir, Zarwanda Ashfarina, and Robby Irsyad. “Efektivitas Peningkatan Keamanan Login Pada Website Menggunakan Enkripsi Caesar Chipper Pendahuluan Peningkatan Teknologi Informasi Dan Internet Telah Membuat Banyak Orang Bergantung.” Adijaya Jurnal Multidisiplin 01, no. 02 (2023): 354–62.

Huda, Choirul, Dadang Iskandar Mulyana, Aji Dwi Prasetyo, and Ali Yafi Zulkarnain. “Implementasi Algoritma One Time Mengggunakan Algoritma Chiper Transposition Sebagai Pengamanan Rahasia Pesan.” Jurnal J-COM (Jurnal … 03, no. 01 (2022): 40–48. https://ejurnalunsam.id/index.php/jicom/article/view/4997%0Ahttps://ejurnalunsam.id/index.php/jicom/article/download/4997/3171.

Kaniawulan, Ismi, M Rafi Muttaqin, and Dhiya Ulhaq. “Sistem Manajemen Pengetahuan Forum Diskusi Dosen Knowledge Management System of Lecturer Discussion Forum.” Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK) 7, no. 1 (2020): 51–58. https://doi.org/10.25126/jtiik.202071258.

Kehista, Adisya Poeja, Achmad Fauzi, Annisa Tamara, Ivanida Putri, and Nurul Afni. “Analisis Keamanan Data Pribadi Pada Pengguna E-Commerce : Ancaman , Risiko , Strategi Kemanan ( Literature Review )” 4, no. 5 (2023): 625–32.

Kusumaningtyas, Juwita Artanti. “Analisa Algoritma Ciphers Transposition : Study Literature.” Multimatrix I, no. 1 (2018): 1–12. http://jurnal.unw.ac.id:1254/index.php/mm/article/view/152/106.

Laskari, Elena C., G. C. Meletiou, Y. C. Stamatiou, and M. N. Vrahatis. Cryptography and Cryptanalysis through Computational Intelligence. Studies in Computational Intelligence. Vol. 57, 2007. https://doi.org/10.1007/978-3-540-71078-3_1.

Mahto, Dindayal, and Dilip Kumar Yadav. “RSA and ECC,A Comparative Analysis.Pdf.” International Journal of Applied Engineering Research 12, no. 19 (2017): 9053–61.

Ningrum, Desi Fitriani, Muhlis Tahir, Wahyu Dwi Angelina, Eliza Permatasari, Fifi Rinazah Rofiq, Miftakhul Hidayati, Fatimatus Sahroh, Andi Setiawan, and Desifitriani733@gmail.com. “Implementasi Keamanan Data Menggunakan Kriptografi Caesar Chiper Desi.” Adijaya Jurnal Multidisiplin 01, no. 02 (2016): 1–23.

Oktavani, Selli, Fahrizal Rizky, and Indra Gunawan. “Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar ( AES ) JURNAL MEDIA INFORMATIKA [ JUMIN ]” 4 (2023): 97–101.

Purnamasari, D, A K Dewi, and A N Trisetiyanto. “Analisis Performansi Kriptografi Berbasis Caesar Cipher Untuk Keamanan Data Menggunakan Python Pada Tembang Macapat.” Journal of Systems 1, no. 2 (2021): 50–54. https://www.e-journal.ivet.ac.id/index.php/jsite/article/view/2079.

Raodia, Raodia. “Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime).” Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah Dan Hukum 6, no. 2 (2019): 39. https://doi.org/10.24252/jurisprudentie.v6i2.11399.

Rauf, Budi Wijaya. “Kombinasi Steganografi Bit Matching Dan Kriptografi Playfair Cipher, Hill Cipher Dan Blowfish.” Jurnal Teknologi Informasi 4, no. 2 (2020): 228–33. https://doi.org/10.36294/jurti.v4i2.1346.

Renaldy, Aldi, Achmad Fauzi, An Nisaa Shabrina, and Hanny Novita Ramadhan. “Peran Sistem Informasi Dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan.” Jurnal Ilmu Multidisiplin 2, no. 1 (2023): 15–22.

Riadi, Muchlisin. “Pengertian, Sejarah Dan Jenis Kriptografi.” Kajian Pustaka, 2014. https://www.kajianpustaka.com/2014/01/pengertian-sejarah-dan-jenis-kriptografi.html.

Sadikin, Rifki. Kriptografi Untuk Keamanan Jaringan Dan Implementasinya Dalam Bahasa Java. Yogyakarta: Penerbit Andi, 2012.

Sulistyo, Budi. Kriptanalisis Cipher Blok Berdasarkan Permainan Kaotik. Vol. 33204013. Bandung: INSTITUT TEKNOLOGI BANDUNG, 2009.

Suyanto, S. “Keamanan Database Menggunakan Metode Enkripsi.” Jurnal Ilmiah Matrik, no. 12 (2012): 137–50.

Utama, Micky Yudi. “Penerapan Matriks Dalam Kriptografi Hill Cipher.” Informatika ITB, 2016.

Wiharto, Yudi, and Ari Irawan. “Enkripsi Data Menggunakan AES 256.” Jurnal Kilat 7, no. 2 (2018): 91–99.

Yonathan, Febri Dwinata, Helfi Nasution, and Heri Priyanto. “Aplikasi Pengaman Dokumen Digital Menggunakan Algoritma Kriptografi Hybrid Dan Algoritma Kompresi Huffman.” Jurnal Edukasi Dan Penelitian Informatika (JEPIN) 7, no. 2 (2021): 181. https://doi.org/10.26418/jp.v7i2.47077.

Zaini, Ahmad. “Implementasi Algoritma Super Enkripsi Pada Pengaman Pesan Berbentuk Teks.” Skripsi. UNIVERSITAS ISLAM NEGERI MAULANA MALIK IBRAHIM, 2021.




DOI: https://doi.org/10.15575/hm.v7i2.27845

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Historia Madania: Jurnal Ilmu Sejarah is Indexed By:

       OpenAIRE                             

All publications by Historia Madania: Jurnal Ilmu Sejarah are licensed under a
Creative Commons Attribution-NonCommercial 4.0 International License