Combination of Rail Fence and Route Cipher: Dual Encryption Strategy in Digital Messages

person Asih Lestari Tunas Pembangunan University Surakarta
person Nanda Putri Tami Tunas Pembangunan University Surakarta
person Fabianus Delan Saputra Tunas Pembangunan University Surakarta
person Erni Widarti Tunas Pembangunan University Surakarta
subjectAbstract

In today’s digital era, the protection of personal and sensitive information has become a critical challenge due to the rapid growth of cyber threats and unauthorized access. Encryption remains one of the most effective strategies to ensure confidentiality and integrity of digital communication. This study proposes a dual encryption approach by combining two classical transposition algorithms: Rail Fence Cipher and Route Cipher. The Rail Fence Cipher rearranges plaintext into a zig-zag pattern across multiple rails, producing an initial ciphertext that obscures the original structure. The Route Cipher then strengthens security by placing this ciphertext into a matrix and reading it according to a predefined route, such as spiral or zig-zag, thereby generating a second ciphertext with higher complexity. The combination of these methods creates layered encryption that is more resistant to cryptanalysis compared to using either algorithm alone. Experimental implementation using Python demonstrates that the dual encryption strategy produces ciphertext that is significantly more randomized and difficult to predict. While this approach does not guarantee absolute security against modern attacks, it offers a practical solution for small-scale applications, educational purposes, and scenarios requiring lightweight encryption. The findings encourage broader adoption of encryption techniques and highlight the relevance of classical algorithms in understanding fundamental cryptographic principles and developing adaptable security strategies in the evolving digital landscape.

labelKeywords:
Rail Fence, Route Cipher, Encryption, Digital Message Security
quick_reference_allReferences

[1] “Kata kunci : virtual, account, transposisi-rail-fence,” vol. 09, 2024.

[2] N. D. Girsang, “Kombinasi Algoritma Kriptografi Transposisi Rail Fence Cipher dan Route Cipher,” vol. 2, no. November, pp. 48–53, 2019.

[3] M. Fadlan, E. Dianti Bintari, and A. Tasya, “Pengamanan Basis Data Dengan Algoritma Transposisi Rail Fence,” SIMKOM, vol. 8, no. 2, pp. 66–72, Jul. 2023, doi: 10.51717/simkom.v8i2.135.

[4] Y. Suhelna, “Perancangan Aplikasi Penyandian Pesan Teks dengan Menggunakan Algoritma Digraph Cipher,” vol. 2, pp. 25–34, 2020.

[5] N. Syah and E. Ardhianto, “Meningkatkan Keamanan Data Menggunakan Super Enkripsi Kombinasi Rail Fence dan Vigenere Autokey Pendahuluan Metode Penelitian,” vol. 23, no. September, pp. 293–300, 2024.

[6] S. Bahri, F. Jihan, and B. Rudianto, “Implementasi Algoritma Super Enkripsi Vigenere Cipher Dan Route Cipher Pada Penyandian Pesan Teks,” J. Mat. UNAND, vol. 12, no. 2, pp. 168–175, 2023.

[7] V. M. Hidayah, D. I. Mulyana, and Y. Bachtiar, “Algoritma Caesar Cipher atau Vigenere Cipher pada Pengenkripsian Pesan Teks,” vol. 05, no. 03, pp. 8563–8573, 2023.

[8] D. Mulyana Iskandar et al., “Penerapan Kriptografi AES pada Fres-Caesas: Perlindungan Pesan Teks dan Fail Dokumen Application of AES Cryptography in Fres-Caesas: Protection of Text Messages and Document Fails,” J. Inf. Technol. Comput. Sci., vol. 7, no. 3, 2024.

[9] L. Purnama, D. Iskandar Mulyana, Y. Maulana, E. Okta, and P. Sulaiman, “Terbit online pada laman web jurnal: https://ejurnalunsam.id/index.php/jicom/ Implementasi Algoritma One Time Mengggunakan Algoritma Chiper Transposition Sebagai Pengamanan Rahasia Pesan”, [Online]. Available: https://ejurnalunsam.id/index.php/jicom/

[10] U. Hasanah, M. Fadli, F. Sahlan, and A. Sas, “Analisis Implementasi Pemerintahan Berbasis Elektronik ( E – Government ) Di Lingkungan Pemerintah Daerah Kabupaten Maros,” vol. 2, no. 1, pp. 44–51, 2024, doi: 10.20895/jasmed.v2i1.1344.

[11] F. Fernando and M. A. I. Pakereng, “Implementasi Super Enkripsi Menggunakan Metode Rail Fence Cipher dan Metode Caesar Cipher Pada Data Pasien Klinik Eka Karigas,” 2022.

[12] H. S. Disemadi, L. Sudirman, J. Girsang, and M. Aninda, “Perlindungan Data Pribadi di Era Digital : Mengapa Kita Perlu Peduli ?,” Sang Sewagati J., vol. 1, no. 2, pp. 67–90, 2023, [Online]. Available: https://journal.uib.ac.id/index.php/sasenal/article/view/8579

[13] S. J. Dinata, “Implementasi Algoritma Penyandian Transposisi Rail Fence pada Data Rekam Medis,” J. Inf. dan Teknol. Ilm., vol. 7, no. 3, pp. 305–309, 2020, [Online]. Available: https://www.ejurnal.stmik-budidarma.ac.id/index.php/inti/article/view/2406

[14] C. A. Sari and W. S. Sari, “Kombinasi Least Significant Bit ( LSB-1 ) Dan Rivest Shamir Adleman ( RSA ) Dalam Kriptografi Citra Warna,” vol. 13, no. 1, pp. 45–58, 2022.

[15] R. D. Zailani and A. Al Akbar, “Android-Based Cryptography Applications Using The Rail Fence Cipher Algorithm Aplikasi Kriptografi Berbasis Android Menggunakan Algoritma Rail Fence Cipher,” vol. 2, no. 2, pp. 303–318, 2023.

[16] F. Siagian, “Super Enkripsi Algoritma Route Cipher Dan Algoritma Variably Modified Permutation Composition (Vmpc) Untuk Pengaman File Citra,” J. Teknol. Inf. Dan Komun., vol. 15, no. 1, pp. 146–154, 2024, doi: 10.51903/jtikp.v15i1.840.

[17] Z. Aufia and E. Alisah, “Enkripsi dan Dekripsi Pesan Menggunakan Metode Vigenere Cipher dan Route Cipher,” vol. 1, no. 2, pp. 93–104, 2021.

[18] E. Noviyantono and M. Fadlan, “Studi Perbandingan Avalanche Effect pada Algoritma Kriptografi Transposisi untuk Meningkatkan Keamanan Data,” vol. 9, pp. 1–5, 2024.

[19] D. Purnamasari and H. Prasetyani, “Analisis Performansi Kriptografi Berbasis Algoritma Caesar Cipher dan Rail Fence Cipher pada Tembang Macapat.”

[20] R. S. Siregar, M. S. Asih, and N. Wulan, “Penerapan Algoritma RC4 dan Rail Fence untuk Enkripsi Database Mahasiswa pada Kampus POLTEKKES Kemenkes Medan,” vol. 7, no. 2, pp. 51–56, 2019.

[21] A. P. Ramadhani, N. P. Tami, A. Lestari, and M. Erkamim, “Layered security model through integration of Vigenere and Hill Cipher in digital message encryption,” vol. 2, no. 2, pp. 130–142, 2024, doi: 10.26905/jisad.v2i2.14005.

[22] A. P. Ramadhani, N. P. Tami, A. Lestari, and V. Wati, “Keamanan Data dengan Super Enkripsi Kombinasi Vigenere dan Atbash Cipher,” vol. 04, no. 02, pp. 2–11, 2024

licenseLicense

Copyright (c) 2025 Journal of Software Engineering and Multimedia (JASMED)

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

format_quoteHow to Citefile_copyCopy
Lestari, A., Tami, N. P., Saputra, F. D., & Widarti, E. (2025). Combination of Rail Fence and Route Cipher: Dual Encryption Strategy in Digital Messages . Journal of Software Engineering and Multimedia (JASMED), 3(2), 75–85. https://doi.org/10.20895/jasmed.v3i2.10097

downloadDownloadable Citation

Tools

grammarly

  

Statics