Application on Hypergraph in Vigenere Chiper
Abstract
Keywords
Full Text:
DOWNLOAD [PDF]References
A. Gerhana, Y., Entik, I., Syarifudin, U., & R. Zulmi, M. (2016). Design of digital image application using vigenere cipher algorithm. In 2016 4th International Conference on Cyber and IT Service Management (pp. 1-5). IEEE. https://doi.org/10.1109/CITSM.2016.7577571
Achmad, A. D., Dewi, A. A., Purwanto, M. R., Nguyen, P. T., & Sujono, I. (2020). Implementation of vigenere cipher as cryptographic algorithm in securing text data transmission. Journal of Critical Reviews, 7(1), 76–79. https://doi.org/10.22159/jcr.07.01.15
Alemami, Y., Mohamed, M. A., & Atiewi, S. (2023). Advanced approach for encryption using advanced encryption standard with chaotic map. International Journal of Electrical and Computer Engineering, 13(2), 1708–1723. https://doi.org/10.11591/ijece.v13i2.pp1708-1723
Ali, N., Sadiqa, A., Shahzad, M. A., Imran Qureshi, M., Siddiqui, H. M. A., Abdallah, S. A. O., & Abd El-Gawaad, N. S. (2024). Secure communication in the digital age: a new paradigm with graph-based encryption algorithms. Frontiers in Computer Science, 6(October). https://doi.org/10.3389/fcomp.2024.1454094
Ardiansyah, F. D., Damayanti, A., Putri, C. A. M., Rany, A. F. D., Biroso, S. J., & Tahir, M. (2023). Implementasi kriptografi Caesar Chiper pada aplikasi enkripsi dan dekripsi. Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer, 3(1), 105–112. https://doi.org/10.55606/juisik.v3i1.438
Baagyere, E. Y., Agbedemnab, P. A. N., Qin, Z., Daabo, M. I., & Qin, Z. (2020). A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers. IEEE Access, 8, 100438–100447. https://doi.org/10.1109/ACCESS.2020.2997838
Badawi, A. Al, Hoang, L., Mun, C. F., Laine, K., & Aung, K. M. M. (2020). PrivFT: Private and Fast Text Classification with Homomorphic Encryption. IEEE Access, 8, 226544–226556. https://doi.org/10.1109/ACCESS.2020.3045465
Dafik, Venkatraman, S., Sathyanarayanan, G., & Baihaki, R. I. (2025). Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology. Statistics, Optimization & Information Computing, 14(1), 247-263. https://doi.org/10.19139/soic-2310-5070-2310
Ding, Y., Tan, F., Qin, Z., Cao, M., & Choo, K. K. R. (2021). DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Transactions on Neural Networks and Learning Systems, 33(6), 4915–4929. https://doi.org/10.1109/TNNLS.2021.3062754
Djumadin, Z. (2023). Privacy protection in the big data era: A review of personal data protection policies. Jurnal Restorasi: Hukum dan Politik, 1(02), 72–78. https://seaninstitute.or.id/bersinar/index.php/restorasi/article/view/61
Gautam, D., Agrawal, C., Sharma, P., Mehta, M., & Saini, P. (2018, May). An enhanced cipher technique using vigenere and modified caesar cipher. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1-9). IEEE.
Meenakshi, A., Mythreyi, O., Mrsic, L., Kalampakas, A., & Samanta, S. (2025). A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages. Mathematics, 13(7), 1–20. https://doi.org/10.3390/math13071049
Moosavi, S. R., Nigussie, E., Levorato, M., Virtanen, S., & Isoaho, J. (2018). Low-latency approach for secure ECG feature based cryptographic key generation. IEEE Access, 6, 428–442. https://doi.org/10.1109/ACCESS.2017.2766523
Nasution, S. D., Ginting, G. L., Syahrizal, M., & Rahim, R. (2017). Data security using Vigenere cipher and Goldbach codes algorithm. International Journal of Engineering Research & Technology (IJERT), 6(1), 360–363. https://doi.org/10.17577/IJERTV6IS010245
NourEldeen, N. M., Badr, E., Hagag, I. M., & Shabana, H. (2025). Graph-Based Approach to the Radio Assignment Problem in Wireless Communication Networks with Applications in Cryptography. European Journal of Pure and Applied Mathematics, 18(1). https://doi.org/10.29020/nybg.ejpam.v18i1.5614
Pabokory, F. N., Astuti, I. F., & Kridalaksana, A. H. (2016). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer, 10(1), 20. https://doi.org/10.30872/jim.v10i1.23
Prihandoko, A. C., Dafik, & Agustin, I. H. (2022). Stream-keys generation based on graph labeling for strengthening Vigenere encryption. International Journal of Electrical and Computer Engineering, 12(4), 3960–3969. https://doi.org/10.11591/ijece.v12i4.pp3960-3969
Ramasamy, P., Ranganathan, V., Kadry, S., Damaševičius, R., & Blažauskas, T. (2019). An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic–Tent map. Entropy, 21(7), 656. https://doi.org/10.3390/e21070656
Saif, H. A., Gharib, G. M. I., & AL-Mousa, M. R. (2021). a Mathematical Proposed Model for Public Key Encryption Algorithms in Cybersecurity. Advances in Mathematics: Scientific Journal, 10(9), 3063–3092. https://doi.org/10.37418/amsj.10.9.1
Saraswat, A., Khatri, C., Sudhakar, Thakral, P., & Biswas, P. (2016). An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication. Procedia Computer Science, 92, 355–360. https://doi.org/10.1016/j.procs.2016.07.390
Soofi, A. A., Riaz, I., & Rasheed, U. (2016). An Enhanced Vigenere Cipher For Data Security. International Journal of Scientific & Technology Research, 5(3), 141–145.
Wang, J., Lan, S., Li, X., Lu, M., Guo, J., Zhang, C., & Liu, B. (2023). Research on the Method of Hypergraph Construction of Information Systems Based on Set Pair Distance Measurement. Electronics (Switzerland), 12(20), 1–16. https://doi.org/10.3390/electronics12204375
DOI: https://doi.org/10.31764/jtam.v10i1.34572
Refbacks
- There are currently no refbacks.
Copyright (c) 2026 Okta Endri Asari, Dafik, Robiatul Adawiyah, Arika Indah Kristiana, Rafiantika Megahnia Prihandini

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
_______________________________________________
JTAM already indexing:
_______________________________________________
![]() | JTAM (Jurnal Teori dan Aplikasi Matematika) |
_______________________________________________
_______________________________________________
JTAM (Jurnal Teori dan Aplikasi Matematika) Editorial Office:


















2.jpg)
