Analisis Performa Beaufort Cipher Dan ROT13 Dalam Proses Enkripsi Dan Dekripsi Pada Data Teks
DOI:
https://doi.org/10.55338/jumin.v7i1.5363Keywords:
Beaufort Cipher, ROT13, Kriptografi, Enkripsi, DekripsiAbstract
This research aims to evaluate the performance of the Beaufort Cipher and ROT13 algorithms in the processes of encryption and decryption. The methodology involves collecting data in the form of digital text of varying sizes, where the Beaufort Cipher algorithm is applied with a key length equal to that of the text, while ROT13 uses a character shift of 13 positions. Testing is conducted to measure the execution time for encryption and decryption on texts of lengths 100, 1,000, 10,000, and 100,000 characters. The results indicate that the ROT13 algorithm exhibits faster execution times compared to the Beaufort Cipher in both encryption and decryption processes. Although the Beaufort Cipher is slower, it demonstrates a linear increase in execution time relative to text length. The conclusions drawn from this study provide insights into the efficiency of both algorithms and recommendations for their application in modern contexts.
Downloads
References
A. D. Pertiwi, A. Fauzi, and S. Syahputra, "Application Of Super Encryption Using Rot 13 Algorithm Method and Algorithm Beaufort Cipher For Image Security Digital," Journal of Artificial Intelligence and Engineering Applications, vol. 2, no. 3, pp. 84-92, Oct. 2023. doi : https://doi.org/10.59934/jaiea.v3i1.263.
R. Risman, “Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at P.T. Samudera Indonesia ”, ijobas, vol. 10, no. 3, pp. 91–98, Dec. 2021. doi : https://doi.org/10.35335/ijobas.v10i3.61.
D. Rachmawati and A. N. Lubis, "Combining Beaufort cipher and RSA-CRT algorithm in a hybrid scheme to secure images," Journal of Physics: Conference Series, vol. 2421, no. 1, p. 012028, 2023, doi: 10.1088/1742-6596/2421/1/012028.
D. Sanjaya and K. Puspita, "Perancangan Aplikasi Validasi Keaslian Sertifikat OSMB Pada Universitas Potensi Utama Menggunakan Algoritma Beaufort", SmartAI Journal, vol. 2 No.1, pp. 31-40, Jan. 2023. Available : https://ejournal.abivasi.id/index.php/SmartAI/article/view/52.
Z. A. Harahap and Nurhayati, "Kombinasi Metode Beaufort Cipher dan Diffie Hellman Untuk Kerahasiaan Isi Tabel MySQL", JID (Jurnal Info Digit), vol. 2 No. 3, pp. 1000-1013, Sept. 2024. Available : https://kti.potensi-utama.org/index.php/JID/article/view/1419.
A. Abiyuda and L. Nababan, "Rancang Bangun Aplikasi Chatting dengan Wireless LAN Menggunakan Metode Beaufort Cipher", Jurnal InSeDS (Information System and Data Science), vol 1. No. 2, Dec. 2022, Available : http://repository.potensi-utama.ac.id/jspui/handle/123456789/5926.
E. Ndruru and Taronisokhi Zebua, "Pembangkitan Kunci Beaufort Cipher Dengan Teknik Blum-blum Shub pada Pengamanan Citra Digital", Bulletin of Information Technology (BIT), vol. 3 No. 1. pp 149-154. June. 2022. doi : https://doi.org/10.47065/ekuitas.v3i2.1167.
L. B. Handoko and C. Umam, "Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB), Journal of Applied Intelligent System, vol. 8 No. 2. pp. 140-151. July. 2023. doi : https://doi.org/10.33633/jais.v8i2.7863.
M. Fadlan, Suprianto, Muhammad, Y. Amaliah, “Double Layered Text Encryption using Beaufort and Hill Cipher Techniques”, IEEE. Dec. 2020. doi : https://doi.org/10.1109/ICIC50835.2020.9288538.
A. H. Hasugian, Y. R. Nasution and N. A. Simanjuntak, “Kombinasi Algoritma Beaufort Cipher dan LS2BIT Untuk Keamanan File Text”, JIRE (Jurnal Informatika & Rekayasa Elektronika), vol. 6 No. 1. April 2023. doi : https://doi.org/10.36595/jire.v6i1.730.
Mahyudi, “Implementasi Kombinasi Algoritma Beaufort Cipher dan Algoritma RSA Dalam Skema Super Enkripsi Untuk Pengamanan File Teks”, Skripsi, Departemen Teknik Informatika, Universitas Islam Negri Sumatra Utara, Medan, Indoensia, 2023.
C. Irawan, E. H. Rachmawanto, C. A. Sari, and C. A. Sugianto, “Super Enkripsi File Dokumen Menggunakan Beaufort Cipher dan Transposisi Kolom”, LPPM – Universitas Muhammadiyah Purwokerto. 2020. Available : http://download.garuda.kemdikbud.go.id/article.php?article=3195351&val=28102&title=SUPER%20ENKRIPSI%20FILE%20DOKUMEN%20MENGGUNAKAN%20BEAUFORT%20CIPHER%20DAN%20TRANSPOSISI%20KOLOM.
Y. R. Nasution, A. H. Hasugian, and Mahyudi, “Penerapan Teknik Super Enkripsi Untuk Keamanan File Teks Menggunakan Gabungan Algoritma Beaufort Cipher dan Algoritma RSA”, Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen), vol. 4 No. 4, Okt. 2023. Pp. 868–889. Available : https://pkm.tunasbangsa.ac.id/index.php/kesatria/article/view/238.
E. Sugiarto, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, Md. K. Sarker, and B. Widjajanto, “Securing Text Messages using the Beaufort-Vigenere Hybrid Method”, Journal of Physics: Conference Series, vol 1577. 2020. Doi : https://doi.org/10.1088/1742-6596/1577/1/012032.
P. A. D. Kusumah, K. Kusrini, K Kusnawi, “Optimizing Data Security: A Literature Review on The Implementation of Beaufort Cipher for Vigenere Affine Cipher”, International Journal of Innovative Science and Research Technology, vol. 9, issue. 2, Feb. 2024, doi : https://doi.org/10.5281/zenodo.10685974.
A. Rachmadsyah, A. Perdana, and A. Budiman, “Kombinasi Algoritma Beaufort Cipher Dan Vigenere Cipher Untuk Pengamanan Pesan Teks Berbasis Mobile Application”, Jurnal Minfo Polgan (Jurnal Manajemen Informatika Politeknik Ganesha), vol. 9 no. 2. Sept. 2020. Available : https://jurnal.polgan.ac.id/index.php/jmp/article/view/10943.
Muhammad Ridho Utomo, “Rancangan Keamanan Informasi Pesan Teks Menggunakan Algoritma Beaufort Cipher”, Skripsi, Sains dan Teknologi/Sistem Komputer, Universitas Pembangunan Panca Budi, Medan, Indonesia, 2020.
T. Zebua, “Implementasi Algoritma Freivalds pada Pembangkitan Kunci Algoritma Beaufot Cipher”, KETIK Jurnal Informatika, vol. 1 no. 3. Pp. 88-94. Jan. 2024. Available : https://jurnal.faatuatua.com/index.php/KETIK/article/view/51.
Md. Z. Rangga, “Modifikasi Algoritma Beaufort Cipher Dengan Transposisi Grup Simetri Untuk Mengamankan Pesan”, Skripsi, Program Studi Matematika, Universitas Negri Islam Maulana Malik Ibrahim, Malang, Indonesia, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Stephen Pratama, Serius Ndruru, Nicky Pascal Tambunan, Muhammad Hasbiallah, Ahmad Turmudi Zy

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Similar Articles
- Mochammad Afirudin, Alfiandi Imam Mawardi, Analisis kinerja konten digital CV Avero Indonesia dalam mendukung pemasaran digital , Jurnal Media Informatika: Vol. 7 No. 1 (2025): Jurnal Media Informatika Edisi Januari - April IN PRESS
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Silvi Fara Dita, Nurkholik Safrudin, Feibert Sianturi, Muhammad Hasbiallah, Abdul Halim Anshor, Sistem Pendukung Keputusan Kebijakan Fasilitas Kampus Universitas pelita bangsa Menggunakan Metode AHP-TOPSIS , Jurnal Media Informatika: Vol. 7 No. 1 (2025): Jurnal Media Informatika Edisi Januari - April IN PRESS