Cryptography With One-Time Pad (OTP) Algorithm Xor Based
DOI:
https://doi.org/10.58471/ju-ti.v3i02.664Keywords:
One-Time Pad (OTP), decryption, Cryptography.Abstract
The One-Time Pad (OTP) algorithm is a symmetric cryptographic method that is recognized as one of the most secure methods for encrypting data. In this study, OTP utilizes a unique random key that has the same length as the original message (plaintext). The encryption and decryption processes are carried out using the XOR (Exclusive OR) operation, which ensures that the resulting ciphertext does not provide information about the plaintext without knowing the key used. This document explains the basic theory of OTP, including the encryption process that produces ciphertext from plaintext and key, and the decryption process that returns ciphertext to plaintext. Through a manual example, this document shows how the characters in the plaintext and key are converted into binary format and operated with XOR to produce ciphertext. Testing using Python is also explained to provide a practical overview of the implementation of this algorithm. Although OTP offers a high level of security due to the random and disposable nature of the key, challenges in key distribution and management often limit its use in practice. The conclusion of this study confirms that although OTP is secure in theory, its real-world application requires special attention to key management to maintain data integrity and confidentiality.
References
Akbar, I., Sari, A. K., Si, S., & Kom, M. (n.d.). Implementasi Enkripsi Homomorfik RSA Termodifikasi Untuk Sistem Electronic Voting. http://etd.repository.ugm.ac.id/
Christy Winaryo, F., Danny Wowor, A., & Indrastanti Widiasari, Mc. R. (2014). Implementasi Modifikasi Kriptografi One Time Pad (OTP) untuk Pengamanan Data File Artikel Ilmiah Peneliti.
Clawdia, J., Khairina, N., & Harahap, M. K. (n.d.). KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer). http://ejurnal.stmik-budidarma.ac.id/index.php/komik
Haq, S. H., Fauzi, A., Thamrin, D., Maulana, P., Hidayat, A. N., Muslih, S. A., & Fernando, A. (2024). Peran Manajemen Sekuriti Dalam Meningkatkan Kesadaran Keamanan Data Mahasiswa Pada Sistem Informasi Akademik Ubhara Jaya (Vol. 1, Issue 2). https://inovanpublisher.org/orbit,
Utomo, P., & Zarlis, M. (2017). Seminar Nasional Teknologi Informatika.
Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th ed.). Pearson Education.
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4), 656-715.
Vernam, G. S. (1926). Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Journal of the American Institute of Electrical Engineers, 45(2), 109-115.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). John Wiley & Sons.
Diffie, W., & Hellman, M. E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
Shannon, C. E. (2012). Teori Komunikasi dari Sistem Kerahasiaan. (Reprint dari karya asli tahun 1949).