Combination of the Vigenère Algorithm using RC4 Key Generator and ECB using LFSR Key Generator
DOI:
https://doi.org/10.32665/james.v9i1.5067Keywords:
Cryptography, Electronic Code Book, Linear Feedback Shift Register, Rivest Cipher 4, Vigen` ere CipherAbstract
This research aims to demonstrate the process of encryption and decryption, as well as the implementation of a program in the form of a Graphical User Interface (GUI), using a combination of the Vigenère Cipher algorithm with an RC4 key generator and the Electronic Code Book (ECB) algorithm with an LFSR key generator. This combination was chosen because the Vigenère Cipher, as a classical algorithm, has a simple substitution structure, while RC4 is able to produce a highly random keystream. Meanwhile, ECB is an efficient modern block encryption method, and LFSR can generate a sequence of random bits based on a polynomial function. Together, these methods form a layered approach to securing messages. The data used in this study consists of plaintext messages in text form chosen by the author. The results show that the encrypted message can be successfully decrypted back into its original form. Therefore, this study proves that combining the Vigenère Cipher algorithm with RC4 and the ECB algorithm with LFSR can be effectively implemented and preserve data authenticity.
References
Akmal, D. A., Dhani, D. M., & Syahila, F. (2024). Kombinasi kriptografi modern dalam keamanan pesan teks. Saturnus: Jurnal Teknologi dan Sistem Informasi, 2(3), 119–128. https://doi.org/10.61132/saturnus.v2i3.204
Amijaya, F. D. T., Syaripuddin, S., A’yun, Q. Q., Nasution, Y. N., Wasono, W., & Huda, M. (2022). Hill cipher algorithm using two keywords and 94 ASCII characters. AIP Conference Proceedings, 2668(1). https://doi.org/10.1063/5.0111696
Andayani, S., & Agista, D. S. (2017). Kriptografi klasik teknik substitusi untuk keamanan data menggunakan VB.Net 2008. Matrix: Jurnal Manajemen Teknologi dan Informatika, 4(2), 75–80.
Boru, M., Sultani, A. A., Mauko, A. Y., Mola, S. A. S., Letelay, K., & Sihotang, D. M. (2024). Kombinasi cipher substitusi (Beaufort dan Vigenere) menggunakan pembangkit kunci RC4 pada kriptografi video audio video interlaced (AVI). Telekontran: Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan, 12(2), 187–195. https://doi.org/10.34010/telekontran.v12i2.14167
Diana, M., & Zebua, T. (2018). Optimalisasi Beaufort cipher menggunakan pembangkit kunci RC4 dalam penyandian SMS. J-SAKTI (Jurnal Sains Komputer dan Informatika), 2(1), 12–22. https://doi.org/10.30645/j-sakti.v2i1.52
Fairuzabadi, M. (2010). Implementasi kriptografi klasik menggunakan Borland Delphi. Jurnal Dinamika Informatika, 4(2), 65–78.
Giawa, Y. N. I. (2022). Implementasi algoritma RC4A dalam pengamanan citra digital. Journal of Computing and Informatics Research, 2(1), 1–9. https://doi.org/10.47065/comforch.v2i1.348
Haris, C. A., & Ariyus, D. (2020). Kombinasi dan modifikasi Vigenere cipher dan Hill cipher menggunakan metode hybrid kode pos, trigonometri, dan konversi suhu sebagai pengamanan pesan. Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, 15(2), 90–96. https://doi.org/10.30872/jim.v15i2.3746
Lutz, M. (2001). Programming Python. O’Reilly Media.
Nahading, T. S., & Wowor, A. D. (2023). Desain pembangkit kunci LFSR dengan skema A5/1 menggunakan empat blok bit fungsi XOR. Kesatria: Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen), 4(2), 409–419. https://doi.org/10.30645/kesatria.v4i2.177
Santoso, K. A., Dhani, E., & Pradjaningsih, A. (2024). Pengaman teks dengan kombinasi metode electronic code book (ECB) dan kode seven segment display. Jurnal Teknologi Informasi dan Ilmu Komputer, 11(1), 85–94. https://doi.org/10.25126/jtiik.20241117448
Saputra, I., Hasibuan, N. A., & Rahim, R. (2017). Vigenere cipher algorithm with grayscale image key generator for secure text file. International Journal of Engineering Research and Technology (IJERT), 6(1), 266–269.
Setyawati, N. Y., Khofid, A. N., Rundi, A. U., & Wati, V. (2021). Modifikasi kriptografi klasik kombinasi metode Vigenere cipher dan Caesar cipher. Journal of Smart System, 1(1), 1–8. https://doi.org/10.36728/jss.v1i1.1601
Sulaiman, R., & Isnanto, B. (2018). Peningkatan keamanan pesan dengan kriptografi RC4 dan steganografi LSB pada file JPEG. Dalam Konferensi Nasional Sistem Informasi (KNSI) 2018.
Widarma, A., Siregar, H. F., & Irawan, M. D. (2019). Teknik keamanan data menggunakan Vigenere cipher dan electronic code book (ECB). J-SAKTI (Jurnal Sains Komputer dan Informatika), 3(2), 393–400. https://doi.org/10.30645/j-sakti.v3i2.157
Widya, H. (2018). Sistem pembelajaran dan pemahaman algoritma electronic code book (ECB) menggunakan metode computer assisted instruction (CAI). JET (Journal of Electrical Technology), 3(3), 149–155.
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2026 Journal of Mathematics Education and Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
PDF Download: 2












