Modified Key Using Multi-Cycle Key in Vigenere Cipher
Ansar Rizal1, Didi Susilo Budi Utomo2, Rihartanto Rihartanto3, Marselina Endah Hiswati4, Haviluddin Haviluddin5

1Ansar Rizal, Department of Information Technology, State Polytechnic of Samarinda, Indonesia.
2Didi Susilo Budi Utomo, Department of Information Technology, State Polytechnic of Samarinda, Indonesia.
3Rihartanto Rihartanto, Department of Information Technology, State Polytechnic of Samarinda, Indonesia.
4Marselina Endah Hiswati, Department of Science and Technology, Respati University of Yogyakarta, Indonesia.
5Haviluddin Haviluddin, Department of Computer and Information Technology, Mulawarman University, Indonesia.
Manuscript received on 16 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 2600-2606 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B13130982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1313.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Encryption-Decryption is one form of securing text data, images and sound in order to minimize data stealing, attack, etc. The purpose of this study is to modified encryption-decryption keys of Vigenere cipher.Based on experiment show that multi-cycle keyencryption-decryption have been implemented. Meanwhile, the best MAE values of final encryption process of 56.837 and final decryption process of 0. In other words, the modification of key is more efficient and effective for data security. Furthermore, the multi-cycle key encryption-decryption optimizing using metaheuristics as one of the future works that can be conducted in order to investigate the best encryption-decryption especially using Vigenere cipher.
Keywords: Vigenere; Encryption; Decryption; Multi-Cycle; Metaheuristics.
Scope of the Article: Multi-Agent Systems