Cryptography With One-Time Pad (OTP) Algorithm Xor Based

Authors

  • Reymond Reymond Teknik Informatika, Universitas Santo Thomas Medan
  • Johanes Manullang Teknik Informatika,Universitas Santo Thomas Medan
  • Jhoische Tamba Teknik Informatika,Universitas Santo Thomas Medan
  • Farel Parasian Sitohang Teknik Informatika,Universitas Santo Thomas Medan
  • Eikel Nioisha Ginting Teknik Informatika,Universitas Santo Thomas Medan

DOI:

https://doi.org/10.58471/ju-ti.v3i02.664

Keywords:

One-Time Pad (OTP), decryption, Cryptography.

Abstract

The One-Time Pad (OTP) algorithm is a symmetric cryptographic method that is recognized as one of the most secure methods for encrypting data. In this study, OTP utilizes a unique random key that has the same length as the original message (plaintext). The encryption and decryption processes are carried out using the XOR (Exclusive OR) operation, which ensures that the resulting ciphertext does not provide information about the plaintext without knowing the key used. This document explains the basic theory of OTP, including the encryption process that produces ciphertext from plaintext and key, and the decryption process that returns ciphertext to plaintext. Through a manual example, this document shows how the characters in the plaintext and key are converted into binary format and operated with XOR to produce ciphertext. Testing using Python is also explained to provide a practical overview of the implementation of this algorithm. Although OTP offers a high level of security due to the random and disposable nature of the key, challenges in key distribution and management often limit its use in practice. The conclusion of this study confirms that although OTP is secure in theory, its real-world application requires special attention to key management to maintain data integrity and confidentiality.

References

Akbar, I., Sari, A. K., Si, S., & Kom, M. (n.d.). Implementasi Enkripsi Homomorfik RSA Termodifikasi Untuk Sistem Electronic Voting. http://etd.repository.ugm.ac.id/

Christy Winaryo, F., Danny Wowor, A., & Indrastanti Widiasari, Mc. R. (2014). Implementasi Modifikasi Kriptografi One Time Pad (OTP) untuk Pengamanan Data File Artikel Ilmiah Peneliti.

Clawdia, J., Khairina, N., & Harahap, M. K. (n.d.). KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer). http://ejurnal.stmik-budidarma.ac.id/index.php/komik

Haq, S. H., Fauzi, A., Thamrin, D., Maulana, P., Hidayat, A. N., Muslih, S. A., & Fernando, A. (2024). Peran Manajemen Sekuriti Dalam Meningkatkan Kesadaran Keamanan Data Mahasiswa Pada Sistem Informasi Akademik Ubhara Jaya (Vol. 1, Issue 2). https://inovanpublisher.org/orbit,

Utomo, P., & Zarlis, M. (2017). Seminar Nasional Teknologi Informatika.

Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th ed.). Pearson Education.

Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4), 656-715.

Vernam, G. S. (1926). Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Journal of the American Institute of Electrical Engineers, 45(2), 109-115.

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.

Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). John Wiley & Sons.

Diffie, W., & Hellman, M. E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.

Shannon, C. E. (2012). Teori Komunikasi dari Sistem Kerahasiaan. (Reprint dari karya asli tahun 1949).

Downloads

Published

2024-11-05

How to Cite

Reymond, R., Johanes Manullang, Jhoische Tamba, Farel Parasian Sitohang, & Eikel Nioisha Ginting. (2024). Cryptography With One-Time Pad (OTP) Algorithm Xor Based. Jurnal Teknik Indonesia, 3(02), 54–60. https://doi.org/10.58471/ju-ti.v3i02.664