Classical Cryptography of Wind ' s Eye Cell Circles

Corresponding author: razisaji25@gmail.com Recived: 06 November 2016, Revised : 10 December 2016 Accepted: 27 December 2016. This classic cryptographic algorithms was designed from the concept of cardinal directions and the S-box. circles Concept given 16 directions winds and 8 circles lined with each cells according to ASCII table. The process of encryption algorithm using two kinds of key symbol that are (k1) form 16 symbols of the wind, and (k2) is a 7-bit binary number. plaintext encryption process become chiperteks1 with forming angle against north wind and k1 roomates are from plaintext rotating accordance angle formed. Chipertext 1 to chipertext 2 using binary numbers divided become r1 as directions displacement away from the center circle and r2 move with rotating around the center circle. Spinning process followed directions clockwise circle if even if odd and vice versa. Decryption process is done by doing a backward on the algorithm by using the key k2 (r2 then r1) and then r1. Spins counter-encryption process. ©2016 JNSMR UIN Walisongo. All rights reserved.


Introduction
Delivery of messages before the computer, so the message is not known to its meaning by the recipient of the unauthorized, then used the art in writing a message known as classical cryptography.Cryptography is a mathematical science that deals with data transformations aimed at making messages unintelligible, preventing them from unauthorized changes, or preventing them from unauthorized use.Cryptography can also be interpreted as a process of converting back from encrypted data into understandable form, meaning that cryptography can be interpreted as a process to protect data in a broad sense [1].
The more sophisticated the technology, cryptography developed from classical cryptography to modern cryptography.The cryptography discussed in this paper is the development of a classical algorithm designed from the S-box concept [2], added with the concept of 16 wind direction [3], and eight circles that all components will be associated with the circle name of the wind cell.

Cryptography
The basic concepts and terms used in cryptography that cryptography is a secret technique in writing, with special characters, using letters and characters outside of their original form, or by other methods that can only be understood by the parties who process the key , Also all things written down.So, in general can be interpreted as the art of writing or solving cipher [4].
Cryptography is one technique that can provide several services to improve the security of information such as authentication, non-repudiation, and confidentiality.Authentication is a service that relates to the identification of the message source's source.The encryption message is to convert the original message (plaintext) into a message in encrypted form (chiphertext).The encryption process will generate encrypted data and can only be opened or read by the recipient who has the key while the description process is returning the encoded data to the original form.The encryption process and the description performed by using the same key are known by the cryptographic cryptography of the symmetry algorithm.
In this type of algorithm, the key is confidential and should be known only to the sender and recipient only.In addition to cryptographic algorithms the key symmetry has been developed as well as cryptographic algorithms asymmetry keys, namely the encryption process and descriptions performed by using different keys.There is a key pair of public keys that are used for the encryption process and the private key (private key) is used for the description process.The public key is not confidential and should be known to the sender when it encrypts the data.Conversely for private key is confidential and only known by data recipient.

Results and Discussion
In this study, we transformed the characters in the ASCII table into a repeating loop forming several cells, as in the Figure 1.
The reference angle used in the circle of the eye cell is the northern axis, the northern axis moves clockwise to rotate 360 degrees.The picture of the circle is divided into 16 parts based on the number of 16 wind direction, the distance for each angle between the direction of the wind is 22.5 degrees.Each wind direction is symbolized by number 0 by 15 in a clockwise order which will then be used as key 1 (k1).Generate the Table 1.
In the circle of the cell of the eye of the wind in a square condition there is up to.As the first odd circle, and as the first even circle as well as so forth to arrive.Which one shifts clockwise, while it shifts counter-clockwise.And then the cell shifts from the pivot circle to the outer circle.So when the main axis split will produce the Figure 2.  A. Encryption of Algorithm 1. Select k1 k2 as the sender of the message.

Converting C1 to
, Pi' Step Algorithm Encryption Plaintext to Cipherteks 1 (Figure 3)   It should be noted that the search is appropriate so that at the end of the plaintext can be a clear sentence.

Conclusion
Wind blow cell circles are simple examples of cryptography by utilizing ASCII codes from 32 to 159, cells in circles, and binary number operations.From the concept of S-Box that usually only use a square shape can be transformed in the form of a circle.Encryption and decryption process can be done by the sender of the message manually and computer.If the text is sent long enough, it will be difficult for users of this algorithm to perform calculations manually.Thus to speed up the process, can use the computer program with the algorithm that has been given in the previous section.

Table 1 .
Provisions angle is calculated from the northern axis.