Website-Based Text Encryption Simulation with Hill Chiper

Penulis

  • T. Sukma Achriadi Sukiman Universitas Malikussaleh, Indonesia
  • Anni Zulfia Universitas Malikussaleh, Indonesia
  • Annisa Karima Universitas Malikussaleh, Indonesia
  • Athiyatul Ulya Universitas Malikussaleh, Indonesia
  • Muharratul Mina Rizky Universitas Syiah Kuala, Indonesia

DOI:

https://doi.org/10.47709/brilliance.v5i2.5757

Kata Kunci:

Hill Cipher, Encryption, Website, Cryptography, Simulation

Abstrak

Data security has become increasingly crucial in the modern digital era, where almost all types of information ranging from text, images, to audio are stored and exchanged in digital form through open networks. The rapid growth of internet-based communication makes data highly vulnerable to interception, modification, or misuse by unauthorized parties. Cryptography is one of the most effective solutions to address these challenges. Among the classical cryptographic techniques, the Hill Cipher remains relevant today because it is based on linear algebra and matrix transformations, which provide a strong mathematical foundation and can be adapted for modern computational implementation. In this study, a web-based application was developed using the Python Flask framework to implement the Hill Cipher algorithm. The application enables users to perform both encryption and decryption of text and images through an interactive interface. Users can input plaintext and key matrices, and the system processes the data to produce encrypted or decrypted outputs in real time. This design not only demonstrates the practicality of applying classical cryptographic concepts with contemporary web technologies but also serves as a valuable educational tool. The results show that the application performs effectively, producing accurate outputs, while also supporting user learning in understanding encryption–decryption processes and guiding efforts to secure digital information.

Referensi

Achriadi, T., et al. (2024). Encryption and description of RGB values in images using the Hill cipher algorithm. Inotera Journal, 9(1), 48. https://doi.org/10.31572/inotera.Vol9.Iss1.2024.ID282

Azlin, Musadat, F., & Nur, J. (2018). Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64. Jurnal Informatika, 7(2), 1–5.

Daeng, Y., Linra, N., Darham, A., Handrianto, D., Sianturi, R. R., Putra, R. P., & Saputra, H. (n.d.). Perlindungan data pribadi dalam era digital: Tinjauan terhadap kerangka hukum perlindungan privasi.

Gusmana, R., Haryansyah, & Wibisono, A. D. (2023). Implementasi algoritma Hill cipher menggunakan kunci matriks 2x2 dalam mengamankan data teks. Generation Journal, 7(3), 31–39.

Hasugian, A. H. (2025). Implementasi algoritma Vigenere cipher untuk keamanan data bantuan sosial di desa. [Nama Jurnal], 5(4).

Husaini, F., Pardede, A. M. H., & Gultom, I. (2022). Penerapan enkripsi menggunakan metode Elgamal guna meningkatkan keamanan data text dan gambar. JUKI: Jurnal Komputer dan Informatika, 4(1), 67–73.

Mariko, S. (2019). Aplikasi website berbasis HTML dan JavaScript untuk menyelesaikan fungsi integral pada mata kuliah kalkulus. Jurnal Inovasi Teknologi Pendidikan, 6(1), 80–91. https://doi.org/10.21831/jitp.v6i1.22280

Sukran, C. P. A., & Huda, I. (2023). Pengembangan aplikasi pembelajaran online dengan metode gamifikasi berbasis web. Journal of Internet and Software Engineering, 4(1), 6–11. https://doi.org/10.22146/jise.v4i1.2456

Syaifuddin, M., Hutagalung, J., & Ganefri, G. (2021). E-learning dalam pengembangan pembelajaran kriptografi. JURTEKSI (Jurnal Teknologi dan Sistem Informasi), 7(2), 117–126. https://doi.org/10.33330/jurteksi.v7i2.914

Sylviani, S., & Permana, F. C. (2024). Penggunaan matriks ordo dan Hill cipher dalam modifikasi metode Playfair cipher. [Nama Jurnal], 10.

Diterbitkan

2025-08-20

Cara Mengutip

Sukiman, T. S. A., Zulfia, A., Karima, A., Ulya, A., & Rizky, M. M. (2025). Website-Based Text Encryption Simulation with Hill Chiper. Brilliance: Research of Artificial Intelligence, 5(2), 806–810. https://doi.org/10.47709/brilliance.v5i2.5757

Artikel paling banyak dibaca berdasarkan penulis yang sama

Artikel Serupa

1 2 3 4 5 > >> 

Anda juga bisa Mulai pencarian similarity tingkat lanjut untuk artikel ini.