ISSN 2087-3336 (Prin. | 2721-4729 (Onlin. TEKNOSAINS: Jurnal Sains. Teknologi dan Informatika Vol. No. 1, 2025, page. http://jurnal. id/index. php/tekno DOI: 10. Cryptographic security analysis of the shift password method using the Google colab application Rokhim Utomo*. Mokhammad Syafaat. Kasiyanto. Dekki Widiatmoko. Rafi Maulana Politehnik Angkatan Darat. Indonesia, 65311 Submitted: 19/06/2024 rohimmadiun@gmail. Revised: 14/07/2024 Accepted: 09/09/2024 ABSTRACT The study of information security methods to prevent unauthorized parties from reading it is known as The Caesar Cipher method is a low-tech yet well-established cryptography technique. One of the earliest and most basic cryptographic methods is the Caesar Cipher, which substitutes a different letter with a specific alphabetic difference for each letter in the text. The Caesar Cipher is simple to comprehend and use, but it has a lot of flaws that leave it open to frequency analysis and brute force attacks. The purpose of this study is to use the Google Colab tool to examine the cryptographic security of the Caesar Cipher technique. In this study. Google ColabAia platform that offers a robust and user-friendly Python programming environmentAiwas utilized to construct and evaluate the Caesar Cipher algorithm. This study design combines an experimental strategy with a descriptive method. The Caesar Cipher technique is put into practice, encryption and decryption simulations are run, and character frequency analysis and brute force assaults are used to analyze security flaws. The study's findings demonstrate that the character distribution pattern is preserved when character frequencies in the original and encrypted text are seen, making it simple for attackers to use frequency analysis to crack the password. This suggests that, in the context of high information security, the Caesar Cipher should not be used. Shift passwords are therefore inappropriate for use in contemporary security applications due to their serious flaws. Keywords: Cryptography. shift cipher. Google colab. INTRODUCTION Cryptography is a strong and efficient way to protect the privacy of data. Cryptographic systems use intricate mathematical procedures that frequently need large computational resources to secure information . Shift cipher is one of the oldest and most basic encryption techniques. Even with its ease of use, this method's security analysis is necessary to comprehend the fundamentals of In shift cipher cryptography, every letter in the original text is changed to a different letter and shifted to a predetermined number of steps in the alphabet. This sort of substitution cipher is known as a monoalphabetic cipher . By using this method, the desired communication is encrypted such that only specific individuals with the appropriate key can decrypt it . Grasp the benefits and drawbacks of this cryptographic method requires a grasp of the shift cipher's security . The message signature and key length are two factors that can impact the shift cipher's level of security . Google Colab is a cloud-based platform that lets you write, execute, and share Python code via a web browser without requiring any device installations . Google Colab makes it possible to analyze, fast and effectively. Python code that is running and shared over a web browser without requiring shift cipher encryption. Researchers may evaluate security strength, use encryption and decryption techniques, and find potential shift password flaws with Google Colab capabilities . Thus, the platform utilized in this study to model and assess the security of shift passwords is Google Colab. Prior research has addressed more complex encryption techniques and real-world applications, highlighting the significance of robust security solutions that advance the field of cryptography by addressing a range TEKNOSAINS: Jurnal Sains. Teknologi dan Informatika is licensed under a Creative Commons Attribution-NonCommercial 4. 0 International License. ISSN 2087-3336 (Prin. | 2721-4729 (Onlin. ISSN 2087-3336 (Prin. | 2721-4729 (Onlin. DOI 10. 37373/tekno. of issues and complexity levels related to data security and encryption. Prior research has employed techniques such as the Data Encryption Standard (DES), the Reverse Cipher, and the RSA approaches to secure guest data at hotels . This paper explains shift passwords and their vulnerabilities and demonstrates how to do cryptography research with Google Colab . Both studies address data security and encryption. the distinction is that the current study focuses on ease of simulation and analysis and uses Google Colab for implementation, whereas earlier studies used RSA and DES to demonstrate their application for secure data transmission and storage. The purpose of this study is to evaluate the shift cipher method's security flaws by utilizing Google Colab as a platform for development and simulation . Because Google Colab offers a robust and user-friendly Python programming environment, it was selected to enable researchers to carry out experiments effectively . It is anticipated that this study will deepen our understanding of shift ciphers and highlight Google Colab's potential as a resource for cryptography research. METHOD An experimental descriptive method is used in this investigation. The platform for implementation and simulation was Google Colab since it utilizes robust and user-friendly Python programming . One of the study phases is to write code for text encryption and decryption in Google Colab by developing a shift cipher algorithm. To test the encryption and decryption methods with a shift key value, a simulation will be run in the following phase. Understanding how the shift cipher functions and how the original message can be encoded and transformed back into its original form is helped by this Testing the algorithm for possible attacks allows security analysts to assess its vulnerabilities. Brute force attacks are particularly effective because they may be used to try every keyAifrom 1 to 26Aito decrypt encrypted material until the right key is found . Additionally, to estimate the key used, researchers performed a frequency analysis by examining the frequency of character appearances in encrypted text and comparing it with the character frequency. Since the letter "E" is the most frequently occurring in English, for instance, its predominance in encrypted text may suggest the presence of a shift key. The analysis's findings will offer comprehensive details regarding the system under development. The process that will be utilized to create the system architecture is as follows: Enkripsi Encryptio Chipertex Decryption Deskripsi Pesan Message Pesan Figure 1. Cryptographic mechanisms. Message As can be seen in Figure 1 the procedure is essentially extremely straightforward . The encryption procedure will transform a message . into a ciphertext. The message will be produced again by the ciphertext through the description process to retrieve it . Documentation and interpretation of results: The last stage is recording and interpreting the results of the implementation and analysis that have been done. Based on the results of frequency analysis and brute force attacks, the efficacy of the shift code will be assessed in the interpretation of the data. RESULTS AND DISCUSSION The outcomes of the shift password algorithm's implementation, simulations of encryption and decryption, and an examination of security flaws discovered throughout the investigation will all be explained by this analysis. The shift password algorithm's application. Google Colab implements the shift password algorithm in the first phase. The code used for encryption and description is as follows. Figure 2. Text encryption algorithm. Rokhim Utomo. Mokhammad Syafaat. Kasiyanto. Dekki Widiatmoko. Rafi Maulana Cryptographic security analysis of the shift password method using the google colab application The encryption process algorithm is shown in Figure 2. Each character in the plaintext is shifted by a predetermined number of positions . in the alphabet using this algorithm. 'A' becomes 'D' and 'B' becomes 'E', for instance, if the shift is 3. Figure 3. Text decryption algorithm. A decryption technique that restores each character in the ciphertext to its original alphabetic place is shown in Figure 3. Testing of encryption and decryption. To test, plaintext input is shifted, then the text is encrypted and decrypted. Figure 4. Examples of algorithms for testing encryption and decryption. To ascertain whether the encryption and decryption process was successful, the researchers carried out various observations using various shift bits and text lengths. Table 1 contains a list of the observations' outcomes. Table 1. Encryption and decryption test results. Plaintext Plaintext Slide Input Chipertext (Encryptio. (Descriptio. Elka Hond Elka Tehnik Xilrmn Tehnik Table 1 demonstrates that the ciphertext may be found on the shift input, where one shift bit was used for the first test, two shifts for the second test, and four shifts for the third test. By contrasting the ciphertext's decoding results with the original plaintext, it is possible to determine the encryption and decryption test results table's success. The encryption and decryption procedure is deemed successful if the decrypted text is identical to the original plaintext. The following is a security flaw study of Google Colab's shift password cryptography Brute force attack ISSN 2087-3336 (Prin. | 2721-4729 (Onlin. DOI 10. 37373/tekno. Since there are only 26 alphabets in shift ciphers, one of their key disadvantages is that they are simple to break using brute force attacks. An attacker can try every shift until they locate the original text. Figure 5. Example of a brute force attack. Figure 5 shows that a brute force attack can be carried out by searching for each shift one by one until the original text is found. Frequency analysis The distribution of characters in the ciphertext, which is consistent with the plaintext, is another An attacker can determine the shift utilized by looking at how frequently certain characters appear in the ciphertext. To determine the shift that was employed, one might examine the ciphertext's character distribution pattern. Figure 6. Frequency analysis in Google Colab. If you enter a code like Figure 6, the character frequency in plaintext and ciphertext will appear as in Figure 7. Character Frequency in Ciphertext Character Frequency in Plaintext Character Character Figure 7. Character frequency results in plaintext and ciphertext. The almost same character distribution pattern between the ciphertext and the plaintext is seen in Figure 7, which an attacker could use to crack the shift cipher. Even though the characters have been encrypted, the frequency pattern of the characters in the plaintext and ciphertext can still be determined. This demonstrates that one of the shift cipher's vulnerabilities is that adversaries can utilize frequency analysis to determine the original letters by looking at how frequently they appear in the ciphertext. CONCLUSION Rokhim Utomo. Mokhammad Syafaat. Kasiyanto. Dekki Widiatmoko. Rafi Maulana Cryptographic security analysis of the shift password method using the google colab application Using the Google Colab program, this study was able to examine the shift password method's cryptographic security. According to the study's findings, the shift password has serious vulnerabilities when it comes to frequency analysis and brute force attacks. As a platform for cryptographic security implementation, simulation, and analysis. Google Colab has shown to be efficacious. Given its simplicity and versatility. Google Colab is advised as a platform for additional cryptography This study highlights the need for a more secure way to protect sensitive data while also showing that the shift password is a weak and that Google Colab has potential as a tool for cryptographic research. Nonetheless, it is strongly advised to employ a more powerful and sophisticated cryptographic algorithm in light of these flaws. REFERENCES