ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Study of Three Pass Protocol on Data Security

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)

Publication Date:

Authors : ; ;

Page : 102-104

Keywords : Cryptography; Symetric And Asymmetric; Protocol Cryptography; Three Pass Protocol;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of symmetric and asymmetric which has advantages and disadvantages of each, one of the problems that arise in cryptography type of symmetric is the key distribution should be given sender to the receiver's tackle the key distribution process used a cryptographic protocol three pass protocol has a way of working in which the sender and receiver do not need to exchange keys

Last modified: 2021-07-01 14:47:12