• Supiyanto Information System faculty of Mathematics and Natural Sciences, Universitas Cenderawasih, Indonesia
  • Anastasia Sri Werdhani Mechanical Engineering, Faculty of Engineering, Universitas Cenderawasih, Indonesia
Keywords: encryption, decryption, cryptography, Vernam cipher, XOR


The Vernam Cipher algorithm is a symmetric key algorithm, as it uses the same key for encryption and decryption. It utilizes a binary number system with XOR operation to produce a series of bits. This study aims to implement the Vernam cipher algorithm to secure personal and confidential image data, which is at risk of misuse when shared through chat applications like Facebook, WhatsApp, and email. Therefore, developing image protection applications is crucial. The research explores whether the vernam cipher algorithm, working with single bits in block form and based on binary numbers, can effectively secure image data, specifically grey scale images with BMP and JPG extensions. The approach involves applying the Vernam cipher algorithm to programming language to create a data security application. The outcome is an image security application program, with test results indicating successful encryption with significant randomness. The decryption process with the Vernam cipher method can restore encrypted images to their original state, although some distortion may occur, especially with JPEG images. Decryption of BMP images is nearly flawless. The key for data security can vary in length and form, with encryption taking longer than decryption.


Download data is not yet available.


Supiyanto and T. Suparwati, “Penerapan Matriks Invers Tergeneralisasi (MIT) Untuk Keamanan Data Pada Sandi Hill,” Indonesia, 2020.

A. Hermansyah and K. M. Helma widya, Syafrawali Pasaribu, “No Title,” in Prosiding Seminar Nasional Teknik UISU (SEMNASTEK), 2019, pp. 200–2006.

N. R. Reddy, C. Aravind Kumar, P. Rajkumar, and V. Velde, “Public key authentication schemes in asymmetric cryptography,” Mater. Today Proc., no. xxxx, pp. 1–5, 2021, doi: 10.1016/j.matpr.2021.02.172.

C. Y. Milian and Sulistyo W., “Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher,” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 7, no. 2, pp. 208–216, 2023, doi: 10.35870/jtik.v7i2.716.

Z. Shabrizqi, “Penerapan Algoritma Vegenere Cipher Dan Vernam Cipher Dalam Penggamanan File Text,” JURIKOM (Jurnal Ris. Komputer), vol. 6, no. 3, pp. 326–332, 2019.

Supiyanto, A. D. Saputro, and M. Asghar, “Text Data Security Using Stream Cipher Algorithm,” vol. 6, no. 158, pp. 613–617, 2023.


Y. Irnanda, “Enkripsi dan Dekripsi Dengan Menggunakan Metode Kriptografi Vernam Cipher (XOR),” Kumpul. Karya Ilm. Mhs. Fak. sains dan Tekhnologi, vol. 1, no. 1, p. 47, 2019.

S. M. Bellovin, “Inventor of the One-Time Pad,” in Cryptologia, 2011, pp. 203–222.

A. Simangunsong and R. M. Simanjorang, “Simulation of The Application of Intelligence in Vernam Cipher Cryptography (One Time Pad),” vol. 15, no. 1, pp. 2723–8695, 2021.

M. H. D. Firmansyah, “Aplikasi Enkripsi Dan Dekripsi Dengan Teknik XOR Menggunakan Metode Vernam Cipher,” Kumpul. Karya Ilm. Mhs. Fak. sains dan Tekhnologi, vol. 2, no. 2, p. 8, 2021.

P. D. . Silitonga and S. Pakpahan, “Application of Integers in Vernam Cipher Cryptography ( One Time Pad ),” vol. 9, no. 2, pp. 350–353, 2021.

G. N. Salmi and F. Siagian, “Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2,” J. Soft Comput. Explor., vol. 3, no. 2, pp. 99–104, 2022, doi: 10.52465/joscex.v3i2.86.

M. Furqan, R. R. Kurniawan, Hasugian A H, and N. I. Z. H, “Digital Image Security System Using Spritz Algorithm,” Infokum, vol. 10, no. 1, pp. 392–397, 2021.

Supiyanto and T. Suparwati, “Perbaikan Kualitas Citra Menggunakan Metode Contrast Stretching,” J. Siger Mat., vol. 02, no. 2, p. 13, 2021, doi: 10.26623/transformatika.v8i2.48.

G. Miftakhul Fahmi, K. N. Isnaini, and D. Suhartono, “Implementation of Steganography on Digital Image With Modified Vigenere Cipher Algorithm and Least Significant Bit (Lsb) Method,” J. Tek. Inform., vol. 4, no. 2, pp. 333–344, 2023, doi: 10.52436/1.jutif.2023.4.2.340.

M. H. D. Firmansyah, “Aplikasi Enkripsi Dan Dekripsi Dengan Teknik XOR Menggunakan Metode Vernam Cipher,” 2021. [Online]. Available:

M. Jumeidi, D. Triyanto, and Y Brianorman, “Implementasi Algoritma Kriptografi Vernam Cipher Berbasis Fpga,” Coding J. Komput. dan Apl., vol. 4, no. 1, 2016, doi:

Supiyanto and S. A. Mandowen, “Advanced hill cipher algorithm for security image data with the involutory key matrix,” J. Phys. Conf. Ser., vol. 1899, no. 1, pp. 1–8, 2021, doi: 10.1088/1742-6596/1899/1/012116.

How to Cite
S. Supiyanto and A. S. Werdhani, “IMAGE DATA SECURITY USING VERNAM CIPHER ALGORITHM”, J. Tek. Inform. (JUTIF), vol. 5, no. 2, pp. 405-413, Apr. 2024.