- Marchandi and Ferdiansyah, “Implementasi Algoritma Vigenere Cipher Dalam Aplikasi Chatting Untuk Pengamanan Informasi Berbasis Desktop,” Skanika, vol. 1, no. 1, pp. 340–345, 2018
- D. A. Sitepu, “Implementasi pengamanan data menggunakan algoritma Advanced Encryption Standart (AES),” J. Ilm. Kaputama, vol. 6, no. 1, pp. 49–58, 2022
- S. Azura et al., “Penerapan Kemanan Data Text menggunakan Metode Kriptografi Vigener Chiper Berbasis Web,” Digit. Transform. Technol. | e, vol. 3, no. 1, pp. 20–28, 2023
- D. R. I. M. Setiadi, A. E. Handoyo, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA,” J. Teknol. dan Sist. Komput., vol. 6, no. 1, p. 37, Feb. 2018
- E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015
- C. A. Sari and W. S. Sari, “Kombinasi Least Significant Bit ( LSB-1 ) Dan Rivest Shamir Adleman ( RSA ) Dalam Kriptografi Citra Warna,” vol. 13, no. 1, pp. 45–58, 2022
- C. A. Sari and E. H. Rachmawanto, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,” J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016
- E. H. Rachmawanto and C. A. Sari, “Gabungan Advanced Encryption Standard Dan Vigenere Cipher Untuk Pengamanan Dokumen Digital,” J. Inform. Polinema, vol. 8, no. 4, pp. 1–8, 2022
- T. Zebua and E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017
- N. E. Saragih, “Implementasi Algoritma One Time Pad pada Pesan,” J. Ilm. MATRIK, vol. Vol.20 No., no. 3, pp. 31–40, 2018
- L. B. Handoko and C. Umam, “Kombinasi Vigenere-Aes 256 dan Fungsi Hash Dalam Kriptografi Aplikasi Chatting,” Pros. Sains Nas. dan Teknol., vol. 12, no. 1, p. 390, Nov. 2022
- R. A. Megantara and F. A. Rafrastara, “Super Enkripsi Teks Kriptografi menggunakan Algoritma Hill Cipher dan Transposisi Kolom,” Pros. SENDI_U 2019, pp. 85–92, 2019
- D. K. Maulana, S. M. Tanjung, R. S. Ritonga, and A. Ikhwan, “Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi,” J. Sains dan Teknol., vol. 3, no. 1, pp. 47–52, 2023
- H. Touil, N. E. Akkad, and K. Satori, “Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers,” in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), 2020, pp. 1–6
- R. Rahim et al., “Combination Vigenere Cipher and One Time Pad for Data Security,” Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 92–94, 2018
- D. Arfandy, M. Simanjuntak, and T. Pasaribu, “Penerapan Metode Vigenere Cipher Untuk Mengamankan Data Text,” JUKI J. Komput. dan Inform., vol. 4, no. 1, pp. 48–54, 2022
- I. W. Utomo, R. Latifah, and R. D. Risanty, “Aplikasi Kriptografi Berbasis Android Menggunakan Algoritma Caesar Cipher & Vigenere Cipher,” J. Sist. Informasi, Teknol. Inf. dan Komput., vol. 9, no. 2, pp. 142–149, 2019
- A. Rachmadsyah, A. Perdana, and A. Budiman, “Kombinasi Algoritma Beaufort Cipher dan Vigenere Cipher untuk Pengamanan Pesan Teks Berbasis Mobile Application,” J. Minfo Polgan, vol. 9, no. 2, pp. 12–17, 2020
- A. Susanto, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, R. R. Ali, and I. U. Wahyu Mulyono, “Dual Security Method for Digital Image using HBV Encryption and Least Significant Bit Steganography,” J. Phys. Conf. Ser., vol. 1201, no. 1, p. 012024, May 2019
- S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017
- D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital,” Din. Rekayasa, vol. 14, no. 1, p. 57, 2018
- A. A. Permana and D. Nurnaningsih, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes),” J. Tek. Inform., vol. 11, no. 2, pp. 177–186, 2018
- I. Prihandi, I. Ranggadara, S. Dwiasnati, Y. S. Sari, and Suhendra, “Implementation of Backpropagation Method for Identified Javanese Scripts,” J. Phys. Conf. Ser., vol. 1477, no. 3, 2020
- S. A. Zebua, “Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital,” J. Comput. Informatics Res., vol. 1, no. 3, pp. 71–81, 2022
- N. B. Putra, B. C. Andika, A. D. P. Bagas, and M. Ridwan, “Implementasi Sandi Vigenere Cipher Dalam Mengenkripsikan Pesan,” J. JOCOTIS - J. Sci. Inform. Robot., vol. 1, no. 1, pp. 42–50, 2023
- S. Sugiyanto and R. K. Hapsari, “Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere,” J. Ultim., vol. 8, no. 2, pp. 131–138, 2017
- J. P. Sermeno, K. A. S. Secugal, and N. E. Mistio, “Modified Vigenere cryptosystem: An integrated data encryption module for learning management system,” Int. J. Appl. Sci. Eng., vol. 18, no. 4, pp. 1–10, 2021
- A. Subandi, M. S. Lydia, R. W. Sembiring, M. Zarlis, and S. Efendi, “Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process,” IOP Conf. Ser. Mater. Sci. Eng., vol. 420, no. 1, p. 012119, Oct. 2018
- A. Salam, D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, “ShiftMod Cipher: A Symmetrical Cryptosystem Scheme,” in 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), 2019, pp. 1–5
- H. K. R. Cahyono, C. A. Sari, D.R.I.M. Setiadi, and E. H. Rachmawanto, “Dual protection on message transmission based on Chinese remainder theorem and rivest cipher 4,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019
Last update:
No citation recorded.
Last update: 2025-04-04 19:46:56
No citation recorded.
Copyright (c) 2024 The authors. Published by Department of Informatics, Universitas Diponegoro

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
The authors who submit the manuscript must understand that the article's copyright belongs to the author(s) if accepted for publication. However, the author(s) grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors should also understand that their article (and any additional files, including data sets, and analysis/computation data) will become publicly available once published under that license. See our copyright policy. By submitting the manuscript to Jmasif, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Masyarakat Informatika).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. Jmasif will not be held responsible for anything arising because of the writer's internal dispute. Jmasif will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. Jmasif allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and Jmasif to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.