A Web Application For Playfair Cipher Cryptography: Method and Implementation

person Argia Putri Ramadhani Universitas Tunas Pembangunan Surakarta
person Apriliana Vera Ardiyanti Universitas Tunas Pembangunan Surakarta
person Erni Widarti Universitas Tunas Pembangunan Surakarta
subjectAbstract

Amidst the increasing digital threats, understanding the basic principles of cryptography is crucial for data security education. While the Playfair Cipher remains a valuable classical algorithm, its manual use is prone to human error and is not compatible with modern computing systems. This research aims to address these issues by upgrading the Playfair Cipher through a software engineering approach, creating a web application that runs using HTML, CSS, and JavaScript. Unlike previous research that focused on descriptive analysis, this research emphasizes the application of new technologies by designing a structured client-side architecture, resulting in seamless processing and server-side execution. The application features a responsive user interface (UI) designed for easy user interaction and immediate visual feedback while constructing key matrices and solving bigrams. The results show that the application achieves 100% accuracy in validating manual logic, especially when verifying the ciphertext "CVSMOBLIMAPUOYHDBY," and offers highly efficient computational performance. This research provides a powerful and interactive software tool that upgrades classical methods and offers an extensible solution for algorithm validation and data security education.

labelKeywords:
Cryptography, Playfair Cipher, Encryption, Message Security, Web Application
quick_reference_allReferences

[1] D. Susanti, “Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks,” Indonesian Journal of Data and Science, vol. 1, no. 1, pp. 11–18, 2020, doi: 10.33096/ijodas.v1i1.4.

[2] E. Susanto, Lady Antira, K. Kevin, E. Stanzah, and A. A. Majid, “Manajemen Keamanan Cyber Di Era Digital,” Journal of Business And Entrepreneurship, vol. 11, no. 1, p. 23, 2023, doi: 10.46273/jobe.v11i1.365.

[3] Dola Ramalinda, Jayadi, and Agung Rachmat Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi,” Journal of International Multidisciplinary Research, vol. 2, no. 6, pp. 665–671, 2024, doi: 10.62504/jimr679.

[4] C. A. D. Hasibuan, “Implementasi Kriptografi dalam Penyisipan Pesan pada Citra Digital menggunakan Metode Playfair Cipher dan Least Significant Bit (LSB),” 2021.

[5] R. Kristianto Hondro, “Modifikasi Platform Kunci Algoritma Playfair Untuk Meningkatkan Nilai Confusion Pada Ciphertext,” Journal of Computer System and Informatics (JoSYC), vol. 1, no. 2, pp. 76–82, 2020.

[6] A. S. Ismaya, G. E. Yuliastuti, and A. Rachman, “Implementasi Metode Modifikasi Playfair Cipher Pada Data Pribadi Stakeholder di SMK Islam Al Futuhiyyah,” pp. 1–8, 2023.

[7] G. A. Perdana, Carudin, and Rini Mayasari, “Implementasi Algoritma Kriptografi Playfair Cipher untuk Mengamankan Data Aset,” Jurnal Informatika Polinema, vol. 7, no. 2, pp. 109–114, 2021, doi: 10.33795/jip.v7i2.394.

[8] P. Pristiwanto, Heri Sunandar, and Berto Nadeak, “Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process,” Jurnal Info Sains : Informatika dan Sains, vol. 10, no. 2, pp. 19–23, 2020, doi: 10.54209/infosains.v10i2.33.

[9] Hermansa, Rusydi Umar, and Anton Yudhana, “Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 3, pp. 454–461, 2020, doi: 10.29207/resti.v4i3.1877.

[10] R. Suriadi, R. Satra, and F. Fattah, “Peningkatan Keamanan Data dengan Menggunakan Equation pada Metode Playfair Cipher,” Buletin Sistem Informasi dan Teknologi Islam, vol. 1, no. 4, pp. 266–269, 2020, doi: 10.33096/busiti.v1i4.685.

[11] E. Prasetyo and Y. F. A. Lubis, “Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse,” JiTEKH, vol. 11, no. 1, pp. 41–50, 2023, doi: 10.35447/jitekh.v11i1.703.

[12] L. Yanti Sipayung, R. Fanry Siahaan, R. Hanum Lubis, D. Novia Amalia, and S. Pelita Nusantara Medan, “Analysis of Data Security Improvement with the 12x8 Matrix Cipher Playfair Algorithm”, doi: 10.54209/jurnalinstall.v17i06.407.

[13] G. M. Miguel Manliclic, K. R. Andrei Lamac, R. C. Regala, M. R. Christopher Blanco, and R. M. Dioses, “Improving the Extended 10x10 Polybius Square Key Matrix for Playfair, Bifid, and Polybius Cipher”.

[14] I. Putra Sinaga, “Implementasi Kriptografi Hybrid Algoritma Elgamal Dan Double Playfair Cipher Dalam Pengamanan File Jpeg Berbasis Dekstop,” 2021. [Online]. Available: https://djournals.com/jieeeJIEEE,

[15] A. A. Siagian and Z. Indra, “Analisis Teknik Playfair dan Shift Cipher sebagai Metode Kriptografi Klasik untuk Keamanan Data,” Jurnal Komputer dan Teknologi, vol. 4, no. 1, pp. 13–19, Jan. 2025, doi: 10.58290/jukomtek.v4i1.315.

[16] M. Tahir, H. Basri, A. Z. Agustina, N. Nofiyanti, S. P. Kinanti, and A. E. Putra, “Transformasi Digital Enkripsi Teks: Implementasi Playfair Cipher pada Platform Google Colaboratory,” Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi, vol. 14, no. 2, p. 1080, Aug. 2025, doi: 10.35889/jutisi.v14i2.2794.

licenseLicense

Copyright (c) 2025 Journal of Software Engineering and Multimedia (JASMED)

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

format_quoteHow to Citefile_copyCopy
Ramadhani, A. P., Ardiyanti, A. V., & Widarti, E. (2025). A Web Application For Playfair Cipher Cryptography: Method and Implementation. Journal of Software Engineering and Multimedia (JASMED), 3(1), 20–29. https://doi.org/10.20895/jasmed.v3i1.10096

downloadDownloadable Citation

Tools

grammarly

  

Statics