Implementasi Hill Cipher Pada Kode Telepon dan Five Modulus Method dalam Mengamankan Pesan

Patmawati Hasan, Selviana Yunita, Dony Ariyus


 The development of sophisticated technology in this era is increasingly rapid, messages that are hidden or kept a secret from people who want to access the secret message need to be safeguarded by the security of the message. One way to be able to hide the secret message so that it is not known or understood by people who do not have rights in the message is to change the message into a secret password and insert using cryptographic and steganographic techniques. A security system built using a combination of the Hill cipher algorithm and Five Modulus Method with the aim of making security strong and layered without reducing or damaging the text messages in the image. The system built using the programming language Matlab. The algorithm used has advantages in encrypting data. Hill Cipher uses a size (m x m) matrix as the key to encrypting and decrypting data. Whereas for steganography uses the Five Modulus Method by checking all pixels in blocks (k x k) and converting each pixel into a number that is divisible by 5. The results of this study are security systems that use the Combination of Hill Cipher and Five Modulus Methods in Securing Text Messages. Based on the results of the accuracy of testing five (5) times on different plaintexts, an accuracy rate of 100% is found, ie there is no difference in the results of encryption or decryption.


Hill cipher; Five Modulus Method; Kode Telepon;

Full Text:

PDF (Indonesian)


Dony Ariyus, 2008, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi, Andi Offset.

Swain G. and Lanka S. K., 2012, A Quick review of Network Security and Steganography, International Journal of Electronics and Computer Science Engineering, vol. 1, no. 2, pp.426-435.

Wang H and Wang S., 2004, Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, vol. 47, no. 10..

Qazi, F., Khan, F.H., Agha, D.S., Khan, S.A., Rehman, S.U., 2019, Modification in Hill Cipher For Crtptogtraphic Application, 3C Tecnologia. Glosas de Innovacion aplicadas a la pyme, ISSN: 2254-4143.

Prasad, MG. V., Sundarayya, P., 2016, Generalized Self-Invertiblekey Generation Algorithm by using Reflection Matrix in Hill Cipher and Affine Hill Cipher, International journal of pharmacy & Technology. ISSN; 0975-766X.

Jassim, F. A., 2013, A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method, International Journal of Computer Applications, Volume 72 No. 17.

Alkadi, I., Robert, S., 2017, Application and Implementation of Secure Hybrid Steganography Algorithm in Private Cloud Platform. Journal of Computer Science Application and Information Technology. DOI:

Ariyus, D., Ardiansyah., 2019, Optimization Substitution Cipher and Hidden Plaintext in Image Data Using LSB Method, Journal of Phisics: Conference Series, Volume 1201.

Qasem, M.H., Qatawneh, M., 2018, Parallel Hill Cipher Encryption Algoritm, Inetrnational Journal of Computer Application, Volume 179, No. 19.

Joshi, K., 2018, A New Approach of Text Steganography Using ASCII Values, International Journal of Engineering Research & Technology (IJERT), Vol. 7 Issue 5.

S. Yunita, P. Hasan, and D. Ariyus, 2019, Modifikasi Algoritma Hill Cipher dan Twofish Menggunakan Kode Wilayah Telepon, Sisfotenika, vol. 9, no. 2, pp. 213–224.

Jane Irma Sari, Sulindawaty, Hengki Tamando Sihotang, 2017, Implementasi Penyembunyian Pesan Pada Citra Digital dengan Menggabungkan Algoritma Hill Cipher dan Metode Least Significant BIT (LSB), Jurnal Mantik Penusa, Volume 1 No 2 Desember 2017

Forouzan, Behrouz, 2006, Cryptography and Network Security, McGraw-Hill.

Kaharuddin, E. Pawan, and D. Ariyus, 2019, Kombinasi Arnold Cat Map dan Modifikasi Hill Cipher Menggunakan Kode Bunyi Beep BIOS PHOENIX, Sisfotenika, vol. 9, no. 2, pp. 159–168.


Article Metrics

Abstract view : 65 times
PDF (Indonesian) - 70 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Badan Pengelola Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (SISFOTENIKA) STMIK Pontianak.


Jurnal Ilmiah SISFOTENIKA terindex di :











ISSN Printed : 2087-7897

ISSN Online : 2460-5344


Jurnal Ilmiah SISFOTENIKA Terakreditasi Peringkat Empat


Partners & Co-Organizers:

Lisensi Creative Commons

Jurnal Ilmiah SISFOTENIKA: STMIK Pontianak Online Journal ISSN Printed (2087-7897) - ISSN Online (2460-5344) licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional. Flag Counter

View My Stats>