Optimization of Classical Cryptography Security
An Experimental Study on Affine and Vigenere Algorithms in Modern Computing Environments
DOI:
https://doi.org/10.32493/informatika.v10i1.44216Keywords:
Cryptography Optimization, Affine Cipher, Vigenere Cipher, Cryptography Security, Modern ComputingAbstract
Data security in modern computing, particularly in IoT and edge environments, demanded lightweight cryptographic solutions due to resource constraints. Classical cryptographic algorithms, such as the Affine Cipher and Vigenere Cipher, were attractive for their simplicity and low computational overhead but suffer from vulnerabilities to modern attacks, including brute force and frequency analysis. This study aimed to optimize these algorithms by increasing key length and applying polyalphabetic variations, enhancing their resilience to attacks while maintaining efficiency. Experimental resulted demonstrate significant improvements in resistance to decryption attempts, with optimized algorithms proving highly resilient even under constrained environments. Despite minor increased in computational resources, the algorithms remain efficient and practical for IoT applications. These findings underscored the potential of optimized classical cryptography as a secure yet resource-efficient alternative for modern computing systems, bridging the gap between robust security and operational feasibility. Future research could explore hybrid algorithms combining classical and modern techniques.
References
Hanafi, A. A., Hibban, N., Zulfikar, F. M., & Adhinata, F. D. (2021). Penyelesaian Permainan Sudoku Menggunakan Algoritma Backtracking Berbasis Artificial Intelligence. Journal ICTEE, 2(2), 50. https://doi.org/10.33365/jictee.v2i2.1288
Hananto, A. L., Solehudin, A., Irawan, A. S. Y., & Priyatna, B. (2019). Analyzing the kasiski method against vigenere cipher. ArXiv, 6(6), 1–8.
Hasan, K. F., Simpson, L., Baee, M. A. R., Islam, C., Rahman, Z., Armstrong, W., … McKague, M. (2024). A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. IEEE Access, 12(December 2023), 23427–23450. https://doi.org/10.1109/ACCESS.2024.3360412
Latif, I. H. (2020). Time Evaluation of Different Cryptography Algorithms Using Labview. IOP Conference Series: Materials Science and Engineering, 745(1). https://doi.org/10.1088/1757-899X/745/1/012039
Mulyani, A., Kurniadi, D., & Akbar Musadad, M. (2021). Rancang Bangun Aplikasi Pengenalan Rukun Islam Sebagai Media Pembelajaran Menggunakan Teknologi Augmented Reality. Jurnal Algoritma, 18(1), 50–61. https://doi.org/10.33364/algoritma/v.18-1.936
Nugraha, G., Purnama, T. A., & Rizky, A. A. (2022). Rancang Bangun Alat Handrub Otomatis Dan Cek Suhu Tubuh Terhubung Ke Telegram Di Puskesmas Sawahlega. JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 7(1), 10–21. https://doi.org/10.29100/jipi.v7i1.2167
Prihanto, D. J. E., & Pakereng, M. I. (2020). Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Tarian Sajojo Papua. Ultima Computing : Jurnal Sistem Komputer, 11(2), 71–80. https://doi.org/10.31937/sk.v11i2.1454
Ramadhani, N. F., & Triani, N. N. A. (2022). Penerapan Teknologi Berbasis Iot (Internet of Things) Dalam Pengumpulan Bukti Audit Di Masa Pandemi Covid-19. Accounting Global Journal, 6(2), 154–169. https://doi.org/10.24176/agj.v6i2.7572
Sabonchi, A. K. S., & Akay, B. (2020a). A binomial crossover based artificial bee colony algorithm for cryptanalysis of polyalphabetic cipher. Tehnicki Vjesnik, 27(6), 1825–1835. https://doi.org/10.17559/TV-20190422225110
Sabonchi, A. K. S., & Akay, B. (2020b). Cryptanalysis of polyalphabetic cipher using differential evolution algorithm. Tehnicki Vjesnik, 27(4), 1101–1107. https://doi.org/10.17559/TV-20190314095054
Setyaningrum, Y. D., Wijanarto, W., & Rohmani, A. (2019). Penerapan Algoritma AES pada Dokumen Penting Yang Disisipkan Dalam Citra Berbasis Algoritma LSB Dan Sobel. JOINS (Journal of Information System), 4(2), 178–189. https://doi.org/10.33633/joins.v4i2.3099
Shen, Y. (2020). Research on Internet Information Security in the Big Data Era. E3S Web of Conferences, 218, 3–6. https://doi.org/10.1051/e3sconf/202021804008
Silva, C., Cunha, V. A., Barraca, J. P., & Aguiar, R. L. (2024). Analysis of the Cryptographic Algorithms in IoT Communications. Information Systems Frontiers, 26(4), 1243–1260. https://doi.org/10.1007/s10796-023-10383-9
TOPALOĞLU, N., CALP, M. H., & TÜRK, B. (2016). Bilgi Güvenliği Kapsamında Yeni Bir Veri Şifreleme Algoritması Tasarımı ve Gerçekleştirilmesi. Bilişim Teknolojileri Dergisi, 9(3), 291–301. https://doi.org/10.17671/btd.36875
Winarno, B. H., Prayitno, E., & Samudra, S. T. (2019). Analysis of Easy Perception of Use of Information System Using Technology Acceptance Model Method. Journal of International Conference Proceedings, 2(2), 46–49. https://doi.org/10.32535/jicp.v2i2.601
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Edy Prayitno, Basuki Heri Winarno, Ani Lestari

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Jurnal Informatika Universitas Pamulang have CC-BY-NC or an equivalent license as the optimal license for the publication, distribution, use, and reuse of scholarly work.
In developing strategy and setting priorities, Jurnal Informatika Universitas Pamulang recognize that free access is better than priced access, libre access is better than free access, and libre under CC-BY-NC or the equivalent is better than libre under more restrictive open licenses. We should achieve what we can when we can. We should not delay achieving free in order to achieve libre, and we should not stop with free when we can achieve libre.
Jurnal Informatika Universitas Pamulang is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
YOU ARE FREE TO:
- Share : copy and redistribute the material in any medium or format
- Adapt : remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms
