1. Teknik Substitution Cipher
Plain text : SECURITY WEB
Cipher text : ?
(Bebas menggunakan key yang diinginkan)
Key 1 :
ROMEO
Key 1 Unique Letters (In
Order) : R, O, M, E
Key 2 :
WANHENDRA
Key 2 Unique Letters (In
Order) : W, A, N, H, E, D, R
Key 1 Table :
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
R |
O |
M |
E |
A |
B |
C |
D |
F |
G |
H |
I |
J |
K |
L |
N |
P |
Q |
S |
T |
U |
V |
W |
X |
Y |
Z |
Cipher text tahap 1 :
|
S |
E |
C |
U |
R |
I |
T |
Y |
|
W |
E |
B |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
S |
A |
M |
U |
Q |
F |
T |
Y |
|
W |
A |
O |
Key 2 Table :
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
W |
A |
N |
H |
E |
D |
R |
B |
C |
F |
G |
I |
J |
K |
L |
M |
O |
P |
Q |
S |
T |
U |
V |
X |
Y |
Z |
Cipher text tahap 2 :
|
S |
A |
M |
U |
Q |
F |
T |
Y |
|
W |
A |
O |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
Q |
W |
J |
T |
O |
D |
S |
Y |
|
V |
W |
L |
CIPHER TEXT : QWJTODSY VWL
Proses dekripsi dimulai dari urutan key secara membalik : QWJTODSY VWL
Key 2 Table :
WANHENDRA
Key 2 Unique Letters (In Order) : W, A, N, H, E, D, R
|
W |
A |
N |
H |
E |
D |
R |
B |
C |
F |
G |
I |
J |
K |
L |
M |
O |
P |
Q |
S |
T |
U |
V |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Selanjutnya, diisi dengan urutan alphabet
|
W |
A |
N |
H |
E |
D |
R |
B |
C |
F |
G |
I |
J |
K |
L |
M |
O |
P |
Q |
S |
T |
U |
V |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
Q |
W |
J |
T |
O |
D |
S |
Y |
|
V |
W |
L |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
S |
A |
M |
U |
Q |
F |
T |
Y |
|
W |
A |
O |
Dekripsi Tahap 1 :
SAMUQFTY WAO
Key 1 Table : ROMEO
Key 1 Unique Letters (In Order) : R, O, M, E
|
R |
O |
M |
E |
A |
B |
C |
D |
F |
G |
H |
I |
J |
K |
L |
N |
P |
Q |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
R |
O |
M |
E |
A |
B |
C |
D |
F |
G |
H |
I |
J |
K |
L |
N |
P |
Q |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
S |
A |
M |
U |
Q |
F |
T |
Y |
|
W |
A |
O |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
S |
E |
C |
U |
R |
I |
T |
Y |
|
W |
E |
B |
PLAIN TEXT :
SECURITY WEB
2. Teknik Shift Cipher
Plain text : SECURITY WEB
Cipher text : ?
(Bebas menentukan jumlah pergeseran)
Key : 11 (Bergeser ke kanan 11 langkah)
Diberikan urutan angka mulai dari nol (0)
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
Ditambah jumlah sesuai key: (+11)
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
Ubah angka menjadi huruf sesuai tabel pertama
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
|
S |
E |
C |
U |
R |
I |
T |
Y |
|
W |
E |
B |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
D |
P |
N |
F |
C |
T |
E |
J |
|
H |
P |
M |
CIPHER TEXT: DPNFCTEJ HPM
Proses dekripsi dilakukan dari pengurangan jumlah key: DPNFCTEJ HPM
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
Dikurang jumlah sesuai key: (-11)
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
Ubah angka menjadi huruf sesuai tabel pertama
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
|
D |
P |
N |
F |
C |
T |
E |
J |
|
H |
P |
M |
|
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
↓ |
|
S |
E |
C |
U |
R |
I |
T |
Y |
|
W |
E |
B |
PLAIN TEXT: SECURITY WEB

Comments
Post a Comment