Application on Hypergraph in Vigenere Chiper

Okta Endri Asari, Dafik Dafik, Robiatul Adawiyah, Arika Indah Kristiana, Rafiantika Megahnia Prihandini

Abstract


Message protection remains a major focus in the field of cryptography. This study proposes a new development on the Caesar cipher algorithm by utilizing hypergraph as a keystream generation source. The research designs a super (a,d)-hyperedge antimagic total labeling method applied to three hypergraph structures (Volcano, Semi Parachute, and Comb) to generate the keystream. Security is evaluated using four mechanisms: brute force analysis, processing time, ciphertext character distribution, and ciphertext bit size. The findings prove that the hypergraph based approach is robust against brute force attacks, improve memory and time efficiency. Quantitatively, the Comb hypergraph demonstrates the best efficiency, achieving an encryption time of 0.0030 seconds for 512 bytes and superior storage efficiency (e.g., 136 bytes for 16 bytes ), outperforming the Semi Parachute and Volcano structures. The main contributions include the hypergraph labeling-based keystream generation algorithm, dynamic block key construction, and a Vigenere protocol that is more adaptive to storage constraints and computationally efficient..

Keywords


Hypergraph; Symmetric Encryption; Vigenere Chiper.

Full Text:

DOWNLOAD [PDF]

References


A. Gerhana, Y., Entik, I., Syarifudin, U., & R. Zulmi, M. (2016). Design of digital image application using vigenere cipher algorithm. In 2016 4th International Conference on Cyber and IT Service Management (pp. 1-5). IEEE. https://doi.org/10.1109/CITSM.2016.7577571

Achmad, A. D., Dewi, A. A., Purwanto, M. R., Nguyen, P. T., & Sujono, I. (2020). Implementation of vigenere cipher as cryptographic algorithm in securing text data transmission. Journal of Critical Reviews, 7(1), 76–79. https://doi.org/10.22159/jcr.07.01.15

Alemami, Y., Mohamed, M. A., & Atiewi, S. (2023). Advanced approach for encryption using advanced encryption standard with chaotic map. International Journal of Electrical and Computer Engineering, 13(2), 1708–1723. https://doi.org/10.11591/ijece.v13i2.pp1708-1723

Ali, N., Sadiqa, A., Shahzad, M. A., Imran Qureshi, M., Siddiqui, H. M. A., Abdallah, S. A. O., & Abd El-Gawaad, N. S. (2024). Secure communication in the digital age: a new paradigm with graph-based encryption algorithms. Frontiers in Computer Science, 6(October). https://doi.org/10.3389/fcomp.2024.1454094

Ardiansyah, F. D., Damayanti, A., Putri, C. A. M., Rany, A. F. D., Biroso, S. J., & Tahir, M. (2023). Implementasi kriptografi Caesar Chiper pada aplikasi enkripsi dan dekripsi. Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer, 3(1), 105–112. https://doi.org/10.55606/juisik.v3i1.438

Baagyere, E. Y., Agbedemnab, P. A. N., Qin, Z., Daabo, M. I., & Qin, Z. (2020). A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers. IEEE Access, 8, 100438–100447. https://doi.org/10.1109/ACCESS.2020.2997838

Badawi, A. Al, Hoang, L., Mun, C. F., Laine, K., & Aung, K. M. M. (2020). PrivFT: Private and Fast Text Classification with Homomorphic Encryption. IEEE Access, 8, 226544–226556. https://doi.org/10.1109/ACCESS.2020.3045465

Dafik, Venkatraman, S., Sathyanarayanan, G., & Baihaki, R. I. (2025). Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology. Statistics, Optimization & Information Computing, 14(1), 247-263. https://doi.org/10.19139/soic-2310-5070-2310

Ding, Y., Tan, F., Qin, Z., Cao, M., & Choo, K. K. R. (2021). DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Transactions on Neural Networks and Learning Systems, 33(6), 4915–4929. https://doi.org/10.1109/TNNLS.2021.3062754

Djumadin, Z. (2023). Privacy protection in the big data era: A review of personal data protection policies. Jurnal Restorasi: Hukum dan Politik, 1(02), 72–78. https://seaninstitute.or.id/bersinar/index.php/restorasi/article/view/61

Gautam, D., Agrawal, C., Sharma, P., Mehta, M., & Saini, P. (2018, May). An enhanced cipher technique using vigenere and modified caesar cipher. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1-9). IEEE.

Meenakshi, A., Mythreyi, O., Mrsic, L., Kalampakas, A., & Samanta, S. (2025). A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages. Mathematics, 13(7), 1–20. https://doi.org/10.3390/math13071049

Moosavi, S. R., Nigussie, E., Levorato, M., Virtanen, S., & Isoaho, J. (2018). Low-latency approach for secure ECG feature based cryptographic key generation. IEEE Access, 6, 428–442. https://doi.org/10.1109/ACCESS.2017.2766523

Nasution, S. D., Ginting, G. L., Syahrizal, M., & Rahim, R. (2017). Data security using Vigenere cipher and Goldbach codes algorithm. International Journal of Engineering Research & Technology (IJERT), 6(1), 360–363. https://doi.org/10.17577/IJERTV6IS010245

NourEldeen, N. M., Badr, E., Hagag, I. M., & Shabana, H. (2025). Graph-Based Approach to the Radio Assignment Problem in Wireless Communication Networks with Applications in Cryptography. European Journal of Pure and Applied Mathematics, 18(1). https://doi.org/10.29020/nybg.ejpam.v18i1.5614

Pabokory, F. N., Astuti, I. F., & Kridalaksana, A. H. (2016). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer, 10(1), 20. https://doi.org/10.30872/jim.v10i1.23

Prihandoko, A. C., Dafik, & Agustin, I. H. (2022). Stream-keys generation based on graph labeling for strengthening Vigenere encryption. International Journal of Electrical and Computer Engineering, 12(4), 3960–3969. https://doi.org/10.11591/ijece.v12i4.pp3960-3969

Ramasamy, P., Ranganathan, V., Kadry, S., Damaševičius, R., & Blažauskas, T. (2019). An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic–Tent map. Entropy, 21(7), 656. https://doi.org/10.3390/e21070656

Saif, H. A., Gharib, G. M. I., & AL-Mousa, M. R. (2021). a Mathematical Proposed Model for Public Key Encryption Algorithms in Cybersecurity. Advances in Mathematics: Scientific Journal, 10(9), 3063–3092. https://doi.org/10.37418/amsj.10.9.1

Saraswat, A., Khatri, C., Sudhakar, Thakral, P., & Biswas, P. (2016). An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication. Procedia Computer Science, 92, 355–360. https://doi.org/10.1016/j.procs.2016.07.390

Soofi, A. A., Riaz, I., & Rasheed, U. (2016). An Enhanced Vigenere Cipher For Data Security. International Journal of Scientific & Technology Research, 5(3), 141–145.

Wang, J., Lan, S., Li, X., Lu, M., Guo, J., Zhang, C., & Liu, B. (2023). Research on the Method of Hypergraph Construction of Information Systems Based on Set Pair Distance Measurement. Electronics (Switzerland), 12(20), 1–16. https://doi.org/10.3390/electronics12204375




DOI: https://doi.org/10.31764/jtam.v10i1.34572

Refbacks

  • There are currently no refbacks.


Copyright (c) 2026 Okta Endri Asari, Dafik, Robiatul Adawiyah, Arika Indah Kristiana, Rafiantika Megahnia Prihandini

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

_______________________________________________

JTAM already indexing:

                     


_______________________________________________

 

Creative Commons License

JTAM (Jurnal Teori dan Aplikasi Matematika) 
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License

______________________________________________

_______________________________________________

_______________________________________________ 

JTAM (Jurnal Teori dan Aplikasi Matematika) Editorial Office: