Digital Data Security Using a Combination of Base64 Encoding, Rail Fence Cipher, and GZIP Compression

Deden Pradeka, Zahra Khaerunnisa, Syifa Aqila Humaira, Aidha Salsa Billa, Murnawan Murnawan, Budiman Budiman

Abstract


Digital data security is essential in protecting sensitive information in the current information era. This research implements a hybrid security approach by combining Base64 encoding, the Rail Fence cipher, and GZIP compression. Base64 encoding converts digital files into a standardized text format for easier processing, while the Rail Fence cipher applies transposition to further scramble the encoded data, enhancing confidentiality. GZIP compression reduces file size while adding a layer of complexity, making unauthorized data recovery more difficult. The experiment involved ten trials using files with extensions such as XLSX, DOCX, JPG, PDF, and PPTX. Pearson correlation analysis revealed coefficients close to 0.00 or slightly negative, indicating no significant correlation between plaintext and ciphertext, which signifies strong data randomness and security. Additionally, GZIP compression achieved an average file size reduction of approximately 1 KB, although some smaller files showed minimal compression effects. Overall, the combined method effectively enhances both data security and storage efficiency.

Keywords


Data Security, Base64 Encoding, Rail Fence Cipher, GZIP Compression, Cryptography

Full Text:

PDF

References


Design and Build an Assessment Platform by Inserting Moodle-Based Cryptographic Methods

ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64

Combination of rail fence cipher algorithm and least significant bit technique to secure the image file

Aplikasi Server Web Dengan Kompresi GZIP

Ellis TJ, Levy Y. A guide for novice researchers: Design and development research methods. InProceedings of Informing Science & IT Education Conference (InSITE) 2010 Jun 19 (Vol. 10, No. 10, pp. 107-117). Italy, Cassino.

Cotton W. Supporting the use of learning objects in the K-12 environment: A design-based research project.

A Guide for Novice Researchers: Design and Development Research Methods

Information hiding based on histogram and pixel pattern

Design and Build an Assessment Platform by Inserting Moodle-Based Cryptographic Methods

IMPLEMENTASI APLIKASI KRIPTOGRAFI BERBASIS ANDROID MENGGUNAKAN METODE SUBTITUSI DAN PERMUTASI

Analisis Performa Algoritma Kompresi Data dalam Penyimpanan dan Transfer Data

Research on Base64 Encoding Algorithm and PHP Implementation

Combination Base64 and Hashing Variable Length for Securing Data

https://www.redhat.com/en/blog/base64-encoding

An improved algorithmic implementation of rail fence cipher

GNU gzip

KRIPTOGRAFI HILL CIPHER MENGGUNAKAN MATRIKS FIBBONACCI




DOI: https://doi.org/10.17509/coelite.v4i1.82498

Refbacks

  • There are currently no refbacks.


Journal of Computer Engineering, Electronics and Information Technology (COELITE)


is published by UNIVERSITAS PENDIDIKAN INDONESIA (UPI),
and managed by Department of Computer Enginering.
Jl. Dr. Setiabudi No.229, Kota Bandung, Indonesia - 40154
email: coelite@upi.edu
e-ISSN: 2829-4149
p-ISSN: 2829-4157