Vigenere Cipher Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code
DOI:
https://doi.org/10.69616/mit.v3i1.250Keywords:
Vigenere Cipher; Smart Door; Internet of Things; QR Code; Data SecurityAbstract
The Smart Door system based on the Internet of Things (IoT) using QR Code offers automated access but remains vulnerable to data sniffing attacks. This study implements the Vigenère Cipher algorithm to encrypt transmitted data and analyzes the ciphertext's resistance to attacks as well as its impact on communication delay. The system is built using ESP32-CAM as the QR scanner and NodeMCU ESP32 as the main controller, with encryption applied across three communication paths: ESP32-CAM to server, server to database, and server to ESP32. Testing involved data sniffing, delay analysis, and ciphertext evaluation using tools such as dCode and CryptoTool. From 20 sniffed QR Code results, 10 random samples were tested, and only 3 were recognized as Vigenère Cipher and none were decrypted successfully. In the server-to-ESP32 path, only 1 out of 10 ciphertexts was detected and all remained undeciphered. The average delay was recorded at 2.473 seconds (door unlocking) and 3.491 seconds (buzzer activation), with variations due to network stability. The results indicate that Vigenère Cipher effectively enhances data security in resource-constrained IoT devices, although delay optimization is needed to meet real-time system requirements.
References
M. Syahdi Nasution, Muhammad Amin, and Wirda Fitriani, “Smart Sistem Iot Pemberi Pakan Ikan Dengan Menggunakan Metode Time Schedulling Berbasis Mikrokontroller,” J. Zetroem, vol. 5, no. 2, pp. 161–164, 2023, doi: 10.36526/ztr.v5i2.3082.
M. A. Juniawan and A. H. Rismayana, “PROTOTIPE SMART DOOR LOCK BERBASIS INTERNET OF THINGS ( STUDI KASUS LAB KOMPUTER POLITEKNIK TEDC BANDUNG ),” vol. 8, no. 5, pp. 10856–10861, 2024.
M. R. Abdahu, U. Ristian, and H. Hasfani, “Implementasi Smart Helmet Cabinet pada Penyimpanan Helm Berbasis Mobile QR Code,” vol. 9, no. 1, pp. 78–85, 2024.
E. Lantz and T. Pierrou, “Security evaluation of a smart door lock system,” 2022.
H. Fereidouni, O. Fadeitcheva, and M. Zalai, “IoT and Man-in-the-Middle Attacks,” 2023, [Online]. Available: http://arxiv.org/abs/2308.02479
C. Silva, V. A. Cunha, J. P. Barraca, and R. L. Aguiar, “Analysis of the Cryptographic Algorithms in IoT Communications,” Inf. Syst. Front., vol. 26, no. 4, pp. 1243–1260, 2024, doi: 10.1007/s10796-023-10383-9.
H. A. Wahid, J. Maulindar, and A. I. Pradana, “Rancang Bangun Sistem Penyiraman Tanaman Otomatis Aglonema Berbasis IoT Menggunakan Blynk dan NodeMCU 32,” Innov. J. Soc. Sci. Res., vol. 3, no. 2, pp. 6265–6276, 2023.
D. Setiawan, H. Jaya, S. Nurarif, T. Syahputra, and M. Syahril, “Implementasi Esp32-Cam Dan Blynk Pada Wifi Door Lock System Menggunakanteknik Duplex,” J. Sci. Soc. Res., vol. 5, no. 1, p. 159, 2022, doi: 10.54314/jssr.v5i1.807.
Z. Avista and O. Fahlovi, “Rancang Bangun Smart Door Access Berbasis Fingerprint untuk Keamanan Ruang Laboratorium,” Venus J. Publ. Rumpun Ilmu Tek., vol. 2, no. 1, pp. 1–13, 2024, [Online]. Available: https://doi.org/10.61132/venus.v2i1.73
R. Juliansyah, E. Fitriani, N. Paramita, and ..., “Rancang Bangun Sistem Kontrol Motor Feeder dan Monitoring Pakan Ikan Nila Berbasis Smart Relay Zelio,” J. Pendidik. …, vol. 8, pp. 11157–11167, 2024, [Online]. Available: https://www.jptam.org/index.php/jptam/article/view/14054%0Ahttps://www.jptam.org/index.php/jptam/article/download/14054/10820
I. A. Deswiyan, S. Solikhun, S. Sumarno, P. Poningsih, and S. R. Andani, “Rancang Bangun Alat Pendeteksi Ketinggian Air dan Alarm Pemberitahuan Antisipasi Datangnya Banjir Berbasis Arduino Uno,” J. Penelit. Inov., vol. 1, no. 2, pp. 155–164, 2021, doi: 10.54082/jupin.23.
W. Muthia Kansha, Saherih, and Muchlis, “Analisis Perbandingan Struktur dan Performa Framework Codeigniter dan Laravel dalam Pengembangan Web Application,” J. Tek. Inform. STMIK Antar Bangsa, vol. 9, no. 1, pp. 25–31, 2023.
A. Herlan, I. Fitri, and R. Nuraini, “Rancang Bangun Sistem Monitoring Data Sebaran Covid-19 Secara Real-Time menggunakan Arduino Berbasis Internet of Things (IoT),” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 5, no. 2, p. 206, 2021, doi: 10.35870/jtik.v5i2.212.
N. Santi and Y. Mulyanto, “Analisis Kelayakan Jaringan Komputer Menggunakan Alat Sniffing Dan Intrusion Detection System (Ids),” JATI (Jurnal Mhs. Tek. Inform., vol. 8, no. 4, pp. 6141–6147, 2024, doi: 10.36040/jati.v8i4.10079.
M. A. Rizkiawan, E. Kurniawan, H. Ramza, P. Takumi, T. Elektro, and P. Loss, “ANALISIS QUALITY OF SERVICE JARINGAN NIRKABEL MENGGUNAKAN,” vol. 8, no. 5, pp. 9876–9882, 2024.
I. Murni, A. S. Br pa, B. R. Lubis, and A. Ikhwan, “Pengamanan Pesan Rahasia dengan Algoritma Vigenere Cipher Menggunakan PHP,” J. Educ., vol. 5, no. 2, pp. 3466–3476, 2023, doi: 10.31004/joe.v5i2.1027.
D. Arfandy, M. Simanjuntak, and T. Pasaribu, “Penerapan Metode Vigenere Chiper untuk Mengamankan Data Text,” JUKI J. Komput. dan Inform., vol. 4, 2022.
Published
How to Cite
Issue
Section
Copyright (c) 2026 Riski Arasyid, Syamsul Bahri , Kasliono

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant Jurnal Media Information Technology (MIT) the right of first publication with the work simultaneously licensed under the CC BY-SA 4.0 license, allowing others to share and adapt the work with proper attribution and equal sharing of derived works.
















