Three-Pass Protocol Concept in Hill Cipher Encryption Technique
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 7)Publication Date: 2016-07-05
Authors : Andysah Putera Utama Siahaan;
Page : 1149-1152
Keywords : Cryptography; Three-Pass Protocol; Hill Cipher; Encryption; Decryption;
Abstract
Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.
Other Latest Articles
- Raspberry pi and Arduino Based Automated Irrigation System
- Zinc Oxide Nanorods as H2S Gas Sensor
- Effect of Shape and Plan Configuration on Seismic Response of Structure (ZONE II & V)
- An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption
- Seismic Analysis of Space Frame with T and Square Shaped Column
Last modified: 2021-07-01 14:40:32