Main Article Content

Akrilvalerat Deainert Wierfi
Agung Jasuma
Dony Ariyus

Abstract

Data security is a mechanism to protecting data and any attempt to impose limits on a system for access that does not have an authority (unauthorized person) causes poses a risk to valuable fan-sensitive information. To improve security in the text, images, video, and audio can be done by using two data security techniques such as cryptography and steganography. Cryptography is the process of plaintext to ciphertext randomizing using certain patterns. The secret message steganography focuses on inserting data or secret messages into other data such as text, images, video or audio. To increasing the security of data hiding, a combination of the two techniques is used wherein the initial data or message will be encrypted using the SPICA-XB algorithm which is a combination of two cryptographic algorithms namely spinning caesar and binary XOR.

Downloads

Download data is not yet available.

Article Details

How to Cite
Wierfi, A. D., Jasuma, A. and Ariyus, D. (2020) “Message Encryption Using Spinning Caesar XOR Binary Cryptography Algorithm (SPICA-XB): Message Encryption Using Spinning Caesar XOR Binary Cryptography Algorithm (SPICA-XB)”, Jurnal Mantik, 3(4), pp. 439-443. Available at: https://iocscience.org/ejournal/index.php/mantik/article/view/587 (Accessed: 4May2026).
References
[1] Firdaus, Alfikri Zakiy., 2011, Studi dan Analisis Dua Jenis Algoritma Block Cipher: DES dan RC5.
[2] Syafrizal, M., 2007, ISO 17799: Standar Sistem Mana-jemen Keamanan Informasi, Seminar Nasional Teknologi, ISSN: 1978-9777 Issue. 24.
[3] Dominic, Bucerzan., 2008, A Cryptographic Algorithm Based on a Pseudorandom Number Generator, 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.
[4] O.P.Verma, et al., 2011, Peformance Analysis Of Data Encryption Algorithms, Electronics Computer Tech-nology (ICECT), 3rd International Conference. pp. 399-403.
[5] E. Surya and C. Diviya., 2012, A survey on Symmetric Key Encryption Algorithms, International Journal of Computer Science & Communication Networks, vol. 2. pp. 475-477.
[6] Munir, Rinaldi., 2006, Kriptografi, Bandung : In-formatika.
[7] Bender. 1996. Techniques For Data Hiding. IBM Sys-tems Journal.
[8] Setyaningsih, E., 2015, Kriptografi & Implementasinya Menggunakan Matlab.,Yogyakarta : Pen erbit Andi.
[9] Singh, A. Nandal., and A. & Malik, A. 2012. Imple-mentation of Caesar Cipher with Rail Fence for En-hancing Data Security. International Journal of Ad-vanced Research in Computer Science and Software Engineering (IJARCSSE). Vol 2, Issue 12.
[10] Jain, A., Dedhia., R. & Patil, A. 2015. Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communica-tion. International Journal of Computer Application. Vol 129, No. 13.