Research Article
Combination Of Rot13 Cryptographic Algorithm And Ecb (Electronic Code Book) In Data Security
@INPROCEEDINGS{10.4108/eai.20-10-2022.2328872, author={Reni Rahmadani and Bagoes Maulana and Muhammad Dominique Mendoza and Andreas Pratama Partogu Hutabarat and Larson Carstein Raja Aritonang}, title={ Combination Of Rot13 Cryptographic Algorithm And Ecb (Electronic Code Book) In Data Security}, proceedings={Proceedings of the 4th Annual Conference of Engineering and Implementation on Vocational Education, ACEIVE 2022, 20 October 2022, Medan, North Sumatra, Indonesia}, publisher={EAI}, proceedings_a={ACEIVE}, year={2023}, month={5}, keywords={cryptographic algorithm rot13 cryptographic algorithm ecb (electronic code book)}, doi={10.4108/eai.20-10-2022.2328872} }
- Reni Rahmadani
Bagoes Maulana
Muhammad Dominique Mendoza
Andreas Pratama Partogu Hutabarat
Larson Carstein Raja Aritonang
Year: 2023
Combination Of Rot13 Cryptographic Algorithm And Ecb (Electronic Code Book) In Data Security
ACEIVE
EAI
DOI: 10.4108/eai.20-10-2022.2328872
Abstract
Computer security is an important thing in the world of information technology. However, it rarely gets the attention of developers, even computer security is assumed to be a secondary/tertiary requirement for information systems. Nowadays, data encryting algorithms are increasing and; Of course this is related to the term cryptography. Several methods are usually used in this cryptographic system, namely the classical system and the public key system. Among the various algorithms; Existing cryptography, ROT13 algorithm and electronic code book (ECB) are used to solve data security cases. ROT13 is a shift cipher, which is a type of encryption; a simple one in which a ciphertext is created by taking a plain text message and (moving forward in the alphabet) a number of letters. The ECB algorithm is used to randomly encrypt files, and if the ECB algorithm is run with parallel processors, each processor can encrypt or decrypt different plaintext blocks.