SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Three-Pass Protocol Concept in Hill Cipher
Encryption Technique
Andysah Putera Utama Siahaan
Faculty of Computer Science, Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract: Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix
multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before
the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing
the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being
distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the
security.
Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption
1. Introduction
The confidential information must be protected from being
intercepted [9]. There is a various way to perform the
encryption. Hill Cipher is one of the encryption algorithms
that uses matrix [8][7]. The smallest matrix of 2x2 can
produce the ciphertext by providing key as the determinant.
The matrix bigger than 2x2 can be used as well, but the
difficulties in finding the inverse matrix gain more too. In
Hill Cipher, we can randomly describe the integers for keys
beforehand [5][6]. However, sometimes the key provided
does not work. It happens when decoding the ciphertext
back to plaintext. It is different from the original message.
Before using the key, we have to test that it has the right
determinant. Moreover, if so, the inverse key will be applied
to the ciphertext when decryption is happening. Since we
use the key as a password to modify the message, we have to
send or give to someone who is responsible for decrypting
the message. The key must be distributed, and this moment
will be taken by third parties to intercept the known plaintext
to be breakable. Three-Pass Protocol is the best way to
reduce the gap of interception. On the application of this
algorithm, the form of the matrix must be modified. The are
several changes of Hill Cipher part to make the both
algorithms work together.
2. Theories
The symmetric key is one of the cryptographic systems that
uses the same kind of keys in encryption and decryption.
Hill Cipher uses the symmetric key in its application.
However, the keys used in encryption and decryption are
different but same. It happens because the key used in
decryption is the inverse of the original key applied when
sending plaintext to the receiver [2][3]. The both keys must
be correctly calculated for them to generate encrypt and
decrypt key pair in encryption and decryption works.
Hill Cipher is an application of modulo arithmetic in
cryptography [4]. This cryptographic technique uses the
matrix as the vessel of information exchange either on
encryption or decryption part. The basic theory of matrix
used in Hill Cipher is the multiplication between the
matrix and the inverse of the matrix. Hill Cipher is a
symmetric key hard to solve because the cryptanalysis
techniques such as frequency analysis can not be applied
easily to solve this algorithm [2]. Hill cipher is very difficult
to solve if cryptologist has only the ciphertext, but it can be
solved easily if the cryptologist has a part of the plaintext.
Figure 1:The Three-Pass Protocol scheme
Three-Pass Protocol method is a way to send a message
securely from sender to receiver without the need to
exchange or distribute encryption keys [1]. In Three-Pass
Protocol, the sender encrypts the message using a unique
encryption key then they send it to the receiving participant.
When the receiver gets the encrypted message, they then
encrypt it with their own unique encryption key and send
back to the sender. Then the sender decrypts the message
with their own key. After this, there is only one level of
encryption on the package which is sent to the receiver who
decrypts the final layer with their unique decryption key and
reads the data. This protocol can only be used if using
commutative ciphers or LIFO method. Commutative means
that the order of encryption and decryption is
interchangeable (Encryption A - Encryption B - Decryption
A - Decryption B) [4](Figure 1).
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1149
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
3. Proposed Work
In the application of Three-Pass Protocol in Hill Cipher, the
plaintext cannot directly transform to ciphertext and then re-
encrypt the message with the second key. If we do this when
doing the decryption, the message will not turn back to its
original message, it turns to different characters order. We
have to modify the encryption block with a square block. It
means, when we use a key of a matrix of 2 x 2, the plaintext
block will be 2 x 2 as well. It is totally different from the
usual Hill Cipher encryption that uses different matrix order.
𝐢 =
π‘Ž 𝑏
𝑐 𝑑
π‘₯
𝑝1 𝑝3
𝑝2 𝑝4
π‘šπ‘œπ‘‘ π‘‡π‘œπ‘‘π‘Žπ‘™πΆβ„Žπ‘Žπ‘Ÿπ‘Žπ‘π‘‘π‘’π‘Ÿ (1)
𝐷 =
π‘Ž 𝑏
𝑐 𝑑
βˆ’1
π‘₯
𝑐1 𝑐3
𝑐2 𝑐4
π‘šπ‘œπ‘‘ π‘‡π‘œπ‘‘π‘Žπ‘™πΆβ„Žπ‘Žπ‘Ÿπ‘Žπ‘π‘‘π‘’π‘Ÿ (2)
From the formulas above, the encryption and decryption are
using the same blocks with the key.
4. Testing and Implementation
In this section, we try to prove the Three-Pass Protocol.
Let’s take an example below:
Plaintext : ANDY
65 68
78 89
Key 1 :
240 97
65 163
Key 2 :
187 23
148 223
Key 1-1
:
205 145
113 16
Key 2-1
:
55 209
76 115
Now we prove that the keys provided are invertible.
Key 1 :
240 97
65 163
Determinant : (240 * 163 - 97 * 65)mod 256
47 (D β‰  0and D β‰  Even)
Key 2 :
187 23
148 223
Determinant : (187 * 223 - 23 * 148) mod 256
153 (D β‰  0 and D β‰  Even)
Since determinants are not zero or even, we can use the key
pair as keys for Hill Cipher.
Encryption 1
Plaintext :
65 68
78 89
Ciphertext 1 :
240 97
65 163
x
65 68
78 89
C1 : (240 * 65 + 97 * 78) mod 256
23166 mod 256
126
C2 : (65 * 65 + 163 * 78) mod 256
16939 mod 256
43
C3 : (240 * 68 + 97 * 89) mod 256
24953 mod 256
121
C4 : (65 * 68 + 163 * 89) mod 256
18927 mod 256
239
Ciphertext 1 :
126 121
43 239
𝑇
Ciphertext 1T
:
126 43
121 239
Encryption 2
Ciphertext 1T
:
126 43
121 239
Ciphertext 2 :
187 23
148 223
x
126 43
121 239
C1 : (187 * 126 + 23 * 121) mod 256
26345mod 256
233
C2 : (148 * 126 + 223 * 121) mod 256
45631mod 256
63
C3 : (187 * 43 + 23 * 239) mod 256
13538mod 256
226
C4 : (148 * 43 + 223 * 239) mod 256
59661mod 256
13
Ciphertext 2 :
233 226
63 13
𝑇
Ciphertext 2T
:
233 63
226 13
Ciphertext 2T
is the final result of the encryption the both
methods. And for the decryption, we do the same way as
easrlier. We see the explanation below:
Decryption 1
Ciphertext 2T
:
233 63
226 13
Ciphertext 3
205 145
113 16
x
233 63
226 13
C1 : (205 * 233 + 145 * 226) mod 256
80535mod 256
151
C2 : (113 * 233 + 16 * 226) mod 256
29945mod 256
249
C3 : (205 * 63 + 145 * 13) mod 256
14800mod 256
208
C4 : (113 * 63 + 16 * 13) mod 256
7327mod 256
159
Ciphertext 3 :
151 208
249 159
𝑇
Ciphertext 3T
:
151 249
208 159
Decryption 2
Ciphertext 3T
:
151 249
208 159
Plaintext :
55 209
76 115
x
151 249
208 159
P1 : (55 * 151 + 209 * 208) mod 256
51777 mod 256
65
P2 : (76 * 151 + 115 * 208) mod 256
35396 mod 256
68
P3 : (55 * 249 + 209 * 159) mod 256
46926 mod 256
78
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1150
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
P4 : (76 * 249 + 115 * 159) mod 256
37209 mod 256
89
Plaintext :
65 78
68 89
𝑇
Plaintext T
:
65 68
78 89
PlaintextT
is the final result of the decryption the both
methods.
After calculation, we can see the plaintext is turned into
three parts of ciphertexts before finally turned back into
plaintext again. Each participant needs to perform two stage
of calculation where the sender does the encryption and
decryption.For example in Table 1, it shows the complete
work of encryption and decryption processes. The sentence
is β€œTHE QUICK BROWN FOX JUMPS OVER THE LAZY
DOG”. There are 40 characters. The PT1 shows the ASCII
code of the characters, CT1, CT2 and CT3 is the three-pass
protocol processes. The PT2 is the decryption of the
ciphertext.
Table 1:Sample of Three-Pass Protocol in Hill Cipher
NO. PT1 CT1 CT2 CT3 PT2
1 84 228 5 115 84
2 72 179 225 97 72
3 69 220 63 240 69
4 32 135 123 248 32
5 81 198 212 185 81
6 85 24 131 252 85
7 73 11 42 167 73
8 67 179 20 194 67
9 75 253 102 228 75
10 32 228 140 67 32
11 66 169 123 14 66
12 82 246 81 242 82
13 79 30 154 224 79
14 87 34 32 91 87
15 78 213 124 190 78
16 32 186 153 133 32
17 70 151 150 148 70
18 79 72 28 234 79
19 88 162 109 46 88
20 32 72 110 109 32
21 74 197 79 183 74
22 85 251 141 11 85
23 77 142 202 234 77
24 80 95 169 111 80
25 83 181 111 183 83
26 32 187 141 8 32
27 79 129 90 74 79
28 86 149 88 118 86
29 69 9 70 250 69
30 82 92 222 15 82
31 32 7 151 48 32
32 84 96 213 10 84
33 72 39 122 240 72
34 69 68 208 248 69
35 32 216 153 142 32
36 76 96 232 187 76
37 65 69 139 137 65
38 90 255 179 220 90
39 89 155 206 180 89
40 32 163 180 110 32
The use of Three-Pass Protocol on Hill Cipher is very useful
way to improve the data security level in the process of
sending a message. Besides improving the security, this
method also stops distributing keys between sender and
receiver. If someone wants to take the information, it will be
suspended.In Table 1, we see there are three ciphertext
produced. Someone might be intercepting the information.
But actually, he does not have the keys since they are not
transferred. It is hard to break the hidden information since
the key is not provided. But in the conventional method, the
key is distributed as well. It really makes the key vulnerable.
5. Conclusion
We concludethat Three-Pass Protocol can be applied in Hill
Cipher encryption. It helps the sender to give more
protection to their data from being intercepted. The
undistributed key system is more secure since the both
participants do not have to exchange key when doing this
process. Three-Pass Protocol is the best technique to gain the
information security more.
References
[1] A. A. Abdullah, R. Khalaf dan M. Riza, β€œA Realizable
Quantum Three-Pass Protocol Authentication,”
Mathematical Problems in Engineering, 2015.
[2] R. Kumar dan R. C., β€œAnalysis of Diffie Hellman Key
Exchange Algorithm with Proposed Key Exchange
Algorithm,” International Journal of Emerging Trends &
Technology in Computer Science, vol. 4, no. 1, pp. 40-
43, 2015.
[3] M. Ahmed, B. Sanja, D. Aldiaz, A. Rezaei dan H.
Omotunde, β€œDiffie-Hellman and Its Application in
Security Protocols,” International Journal of Engineering
Science and Innovative Technology, vol. 1, no. 2, pp. 69-
73, 2008.
[4] C. Stubbs, β€œThree-Pass Protocol,” 20 November 2013.
[Online]. Available:
http://asymmetriccryptography.blogspot.co.id/. [Diakses
1 May 2016].
[5] M. N. A. Rahman, A. F. A. Abidin, M. K. Yusof dan N.
S. M. Usop, β€œCryptography: A New Approach of
Classical Hill Cipher,” International Journal of Security
and Its Applications, vol. 7, no. 2, pp. 179-190, 2013.
[6] S. I. Chowdhury, S. A. M. Shohag dan H. Sahid, β€œA
Secured Message Transaction Approach by Dynamic
Hill Cipher Generation and Digest Concatenation,”
International Journal of Computer Applications, vol. 23,
no. 9, pp. 25-31, 2011.
[7] A. A. Khalaf, M. S. A. El-karim dan H. F. A. Hamed, β€œA
Triple Hill Cipher Algorithm Proposed to Increase the
Security of Encrypted Binary Data and its
Implementation Using FPGA,” ICACT Transactions on
Advanced Communications Technology, vol. 5, no. 1,
pp. 752-757, 2016.
[8] J. Chase dan M. Davis, β€œExtending the Hill Cipher,”
2010.
[9] A. P. U. Siahaan, "RC4 Technique in Visual
Cryptography RGB Image Encryption," International
Journal of Computer Science and Engineering, vol. 3, no.
7, pp. 1-6, 2016.
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1151
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Author Profile
Andysah Putera Utama Siahaan was born in
Medan, Indonesia, in 1980. He received the S.Kom.
degree in computer science from Universitas
Pembangunan Panca Budi, Medan, Indonesia, in
2010, and the M.Kom. in computer science as well
from the University of Sumatera Utara, Medan,
Indonesia, in 2012. In 2010, he joined the Department of
Engineering, Universitas Pembangunan Panca Budi, as a Lecturer,
and in 2012 became a junior researcher. He is applying for his Ph.
D. degree in 2016. He has written in several international journal
and conference. He is now active in writing papers and joining
conferences.
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1152

More Related Content

What's hot

Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithmsHarry Potter
Β 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
Β 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
Β 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Β 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
Β 
The rst collision for full SHA-1 (SHATTERED)
The rst collision for full SHA-1 (SHATTERED)The rst collision for full SHA-1 (SHATTERED)
The rst collision for full SHA-1 (SHATTERED)Tom K
Β 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
Β 
Message integrity protocol
Message integrity protocolMessage integrity protocol
Message integrity protocolPriyaKarnan3
Β 
Solutions crypto4e
Solutions crypto4eSolutions crypto4e
Solutions crypto4eJack Ndahiro
Β 
Rass presentation
Rass presentationRass presentation
Rass presentationShalini Guha
Β 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Publishing House
Β 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Journals
Β 
Tweet Cloud
Tweet CloudTweet Cloud
Tweet CloudMinwoo Kim
Β 

What's hot (17)

Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Β 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
Β 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Β 
Detecting crypto
Detecting cryptoDetecting crypto
Detecting crypto
Β 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Β 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
Β 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
Β 
The rst collision for full SHA-1 (SHATTERED)
The rst collision for full SHA-1 (SHATTERED)The rst collision for full SHA-1 (SHATTERED)
The rst collision for full SHA-1 (SHATTERED)
Β 
Ch10
Ch10Ch10
Ch10
Β 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
Β 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Β 
Message integrity protocol
Message integrity protocolMessage integrity protocol
Message integrity protocol
Β 
Solutions crypto4e
Solutions crypto4eSolutions crypto4e
Solutions crypto4e
Β 
Rass presentation
Rass presentationRass presentation
Rass presentation
Β 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
Β 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
Β 
Tweet Cloud
Tweet CloudTweet Cloud
Tweet Cloud
Β 

Similar to Three Pass Protocol Concept in Hill Cipher Encryption Technique

Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
Β 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
Β 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
Β 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
Β 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
Β 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
Β 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
Β 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Β 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
Β 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Β 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
Β 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic CryptographyUniversitas Pembangunan Panca Budi
Β 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
Β 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
Β 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Β 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureAdri Jovin
Β 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
Β 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
Β 

Similar to Three Pass Protocol Concept in Hill Cipher Encryption Technique (20)

Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Β 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
Β 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Β 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Β 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Β 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
Β 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
Β 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
Β 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
Β 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
Β 
Network Security
Network SecurityNetwork Security
Network Security
Β 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
Β 
O017128591
O017128591O017128591
O017128591
Β 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Β 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
Β 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
Β 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Β 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
Β 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
Β 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
Β 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
Β 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
Β 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Β 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Β 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Β 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Β 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Β 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
Β 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
Β 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
Β 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
Β 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
Β 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
Β 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
Β 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
Β 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
Β 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
Β 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Dr. Mazin Mohamed alkathiri
Β 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Β 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
Β 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Β 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
Β 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
Β 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
Β 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
Β 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Β 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
Β 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Β 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
Β 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Β 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Β 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Β 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Β 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
Β 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Β 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Β 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Β 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Β 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
Β 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Β 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Β 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
Β 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
Β 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Β 

Three Pass Protocol Concept in Hill Cipher Encryption Technique

  • 1. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5 Issue 7, July 2016 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Three-Pass Protocol Concept in Hill Cipher Encryption Technique Andysah Putera Utama Siahaan Faculty of Computer Science, Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract: Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security. Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption 1. Introduction The confidential information must be protected from being intercepted [9]. There is a various way to perform the encryption. Hill Cipher is one of the encryption algorithms that uses matrix [8][7]. The smallest matrix of 2x2 can produce the ciphertext by providing key as the determinant. The matrix bigger than 2x2 can be used as well, but the difficulties in finding the inverse matrix gain more too. In Hill Cipher, we can randomly describe the integers for keys beforehand [5][6]. However, sometimes the key provided does not work. It happens when decoding the ciphertext back to plaintext. It is different from the original message. Before using the key, we have to test that it has the right determinant. Moreover, if so, the inverse key will be applied to the ciphertext when decryption is happening. Since we use the key as a password to modify the message, we have to send or give to someone who is responsible for decrypting the message. The key must be distributed, and this moment will be taken by third parties to intercept the known plaintext to be breakable. Three-Pass Protocol is the best way to reduce the gap of interception. On the application of this algorithm, the form of the matrix must be modified. The are several changes of Hill Cipher part to make the both algorithms work together. 2. Theories The symmetric key is one of the cryptographic systems that uses the same kind of keys in encryption and decryption. Hill Cipher uses the symmetric key in its application. However, the keys used in encryption and decryption are different but same. It happens because the key used in decryption is the inverse of the original key applied when sending plaintext to the receiver [2][3]. The both keys must be correctly calculated for them to generate encrypt and decrypt key pair in encryption and decryption works. Hill Cipher is an application of modulo arithmetic in cryptography [4]. This cryptographic technique uses the matrix as the vessel of information exchange either on encryption or decryption part. The basic theory of matrix used in Hill Cipher is the multiplication between the matrix and the inverse of the matrix. Hill Cipher is a symmetric key hard to solve because the cryptanalysis techniques such as frequency analysis can not be applied easily to solve this algorithm [2]. Hill cipher is very difficult to solve if cryptologist has only the ciphertext, but it can be solved easily if the cryptologist has a part of the plaintext. Figure 1:The Three-Pass Protocol scheme Three-Pass Protocol method is a way to send a message securely from sender to receiver without the need to exchange or distribute encryption keys [1]. In Three-Pass Protocol, the sender encrypts the message using a unique encryption key then they send it to the receiving participant. When the receiver gets the encrypted message, they then encrypt it with their own unique encryption key and send back to the sender. Then the sender decrypts the message with their own key. After this, there is only one level of encryption on the package which is sent to the receiver who decrypts the final layer with their unique decryption key and reads the data. This protocol can only be used if using commutative ciphers or LIFO method. Commutative means that the order of encryption and decryption is interchangeable (Encryption A - Encryption B - Decryption A - Decryption B) [4](Figure 1). Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1149
  • 2. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5 Issue 7, July 2016 www.ijsr.net Licensed Under Creative Commons Attribution CC BY 3. Proposed Work In the application of Three-Pass Protocol in Hill Cipher, the plaintext cannot directly transform to ciphertext and then re- encrypt the message with the second key. If we do this when doing the decryption, the message will not turn back to its original message, it turns to different characters order. We have to modify the encryption block with a square block. It means, when we use a key of a matrix of 2 x 2, the plaintext block will be 2 x 2 as well. It is totally different from the usual Hill Cipher encryption that uses different matrix order. 𝐢 = π‘Ž 𝑏 𝑐 𝑑 π‘₯ 𝑝1 𝑝3 𝑝2 𝑝4 π‘šπ‘œπ‘‘ π‘‡π‘œπ‘‘π‘Žπ‘™πΆβ„Žπ‘Žπ‘Ÿπ‘Žπ‘π‘‘π‘’π‘Ÿ (1) 𝐷 = π‘Ž 𝑏 𝑐 𝑑 βˆ’1 π‘₯ 𝑐1 𝑐3 𝑐2 𝑐4 π‘šπ‘œπ‘‘ π‘‡π‘œπ‘‘π‘Žπ‘™πΆβ„Žπ‘Žπ‘Ÿπ‘Žπ‘π‘‘π‘’π‘Ÿ (2) From the formulas above, the encryption and decryption are using the same blocks with the key. 4. Testing and Implementation In this section, we try to prove the Three-Pass Protocol. Let’s take an example below: Plaintext : ANDY 65 68 78 89 Key 1 : 240 97 65 163 Key 2 : 187 23 148 223 Key 1-1 : 205 145 113 16 Key 2-1 : 55 209 76 115 Now we prove that the keys provided are invertible. Key 1 : 240 97 65 163 Determinant : (240 * 163 - 97 * 65)mod 256 47 (D β‰  0and D β‰  Even) Key 2 : 187 23 148 223 Determinant : (187 * 223 - 23 * 148) mod 256 153 (D β‰  0 and D β‰  Even) Since determinants are not zero or even, we can use the key pair as keys for Hill Cipher. Encryption 1 Plaintext : 65 68 78 89 Ciphertext 1 : 240 97 65 163 x 65 68 78 89 C1 : (240 * 65 + 97 * 78) mod 256 23166 mod 256 126 C2 : (65 * 65 + 163 * 78) mod 256 16939 mod 256 43 C3 : (240 * 68 + 97 * 89) mod 256 24953 mod 256 121 C4 : (65 * 68 + 163 * 89) mod 256 18927 mod 256 239 Ciphertext 1 : 126 121 43 239 𝑇 Ciphertext 1T : 126 43 121 239 Encryption 2 Ciphertext 1T : 126 43 121 239 Ciphertext 2 : 187 23 148 223 x 126 43 121 239 C1 : (187 * 126 + 23 * 121) mod 256 26345mod 256 233 C2 : (148 * 126 + 223 * 121) mod 256 45631mod 256 63 C3 : (187 * 43 + 23 * 239) mod 256 13538mod 256 226 C4 : (148 * 43 + 223 * 239) mod 256 59661mod 256 13 Ciphertext 2 : 233 226 63 13 𝑇 Ciphertext 2T : 233 63 226 13 Ciphertext 2T is the final result of the encryption the both methods. And for the decryption, we do the same way as easrlier. We see the explanation below: Decryption 1 Ciphertext 2T : 233 63 226 13 Ciphertext 3 205 145 113 16 x 233 63 226 13 C1 : (205 * 233 + 145 * 226) mod 256 80535mod 256 151 C2 : (113 * 233 + 16 * 226) mod 256 29945mod 256 249 C3 : (205 * 63 + 145 * 13) mod 256 14800mod 256 208 C4 : (113 * 63 + 16 * 13) mod 256 7327mod 256 159 Ciphertext 3 : 151 208 249 159 𝑇 Ciphertext 3T : 151 249 208 159 Decryption 2 Ciphertext 3T : 151 249 208 159 Plaintext : 55 209 76 115 x 151 249 208 159 P1 : (55 * 151 + 209 * 208) mod 256 51777 mod 256 65 P2 : (76 * 151 + 115 * 208) mod 256 35396 mod 256 68 P3 : (55 * 249 + 209 * 159) mod 256 46926 mod 256 78 Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1150
  • 3. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5 Issue 7, July 2016 www.ijsr.net Licensed Under Creative Commons Attribution CC BY P4 : (76 * 249 + 115 * 159) mod 256 37209 mod 256 89 Plaintext : 65 78 68 89 𝑇 Plaintext T : 65 68 78 89 PlaintextT is the final result of the decryption the both methods. After calculation, we can see the plaintext is turned into three parts of ciphertexts before finally turned back into plaintext again. Each participant needs to perform two stage of calculation where the sender does the encryption and decryption.For example in Table 1, it shows the complete work of encryption and decryption processes. The sentence is β€œTHE QUICK BROWN FOX JUMPS OVER THE LAZY DOG”. There are 40 characters. The PT1 shows the ASCII code of the characters, CT1, CT2 and CT3 is the three-pass protocol processes. The PT2 is the decryption of the ciphertext. Table 1:Sample of Three-Pass Protocol in Hill Cipher NO. PT1 CT1 CT2 CT3 PT2 1 84 228 5 115 84 2 72 179 225 97 72 3 69 220 63 240 69 4 32 135 123 248 32 5 81 198 212 185 81 6 85 24 131 252 85 7 73 11 42 167 73 8 67 179 20 194 67 9 75 253 102 228 75 10 32 228 140 67 32 11 66 169 123 14 66 12 82 246 81 242 82 13 79 30 154 224 79 14 87 34 32 91 87 15 78 213 124 190 78 16 32 186 153 133 32 17 70 151 150 148 70 18 79 72 28 234 79 19 88 162 109 46 88 20 32 72 110 109 32 21 74 197 79 183 74 22 85 251 141 11 85 23 77 142 202 234 77 24 80 95 169 111 80 25 83 181 111 183 83 26 32 187 141 8 32 27 79 129 90 74 79 28 86 149 88 118 86 29 69 9 70 250 69 30 82 92 222 15 82 31 32 7 151 48 32 32 84 96 213 10 84 33 72 39 122 240 72 34 69 68 208 248 69 35 32 216 153 142 32 36 76 96 232 187 76 37 65 69 139 137 65 38 90 255 179 220 90 39 89 155 206 180 89 40 32 163 180 110 32 The use of Three-Pass Protocol on Hill Cipher is very useful way to improve the data security level in the process of sending a message. Besides improving the security, this method also stops distributing keys between sender and receiver. If someone wants to take the information, it will be suspended.In Table 1, we see there are three ciphertext produced. Someone might be intercepting the information. But actually, he does not have the keys since they are not transferred. It is hard to break the hidden information since the key is not provided. But in the conventional method, the key is distributed as well. It really makes the key vulnerable. 5. Conclusion We concludethat Three-Pass Protocol can be applied in Hill Cipher encryption. It helps the sender to give more protection to their data from being intercepted. The undistributed key system is more secure since the both participants do not have to exchange key when doing this process. Three-Pass Protocol is the best technique to gain the information security more. References [1] A. A. Abdullah, R. Khalaf dan M. Riza, β€œA Realizable Quantum Three-Pass Protocol Authentication,” Mathematical Problems in Engineering, 2015. [2] R. Kumar dan R. C., β€œAnalysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm,” International Journal of Emerging Trends & Technology in Computer Science, vol. 4, no. 1, pp. 40- 43, 2015. [3] M. Ahmed, B. Sanja, D. Aldiaz, A. Rezaei dan H. Omotunde, β€œDiffie-Hellman and Its Application in Security Protocols,” International Journal of Engineering Science and Innovative Technology, vol. 1, no. 2, pp. 69- 73, 2008. [4] C. Stubbs, β€œThree-Pass Protocol,” 20 November 2013. [Online]. Available: http://asymmetriccryptography.blogspot.co.id/. [Diakses 1 May 2016]. [5] M. N. A. Rahman, A. F. A. Abidin, M. K. Yusof dan N. S. M. Usop, β€œCryptography: A New Approach of Classical Hill Cipher,” International Journal of Security and Its Applications, vol. 7, no. 2, pp. 179-190, 2013. [6] S. I. Chowdhury, S. A. M. Shohag dan H. Sahid, β€œA Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation,” International Journal of Computer Applications, vol. 23, no. 9, pp. 25-31, 2011. [7] A. A. Khalaf, M. S. A. El-karim dan H. F. A. Hamed, β€œA Triple Hill Cipher Algorithm Proposed to Increase the Security of Encrypted Binary Data and its Implementation Using FPGA,” ICACT Transactions on Advanced Communications Technology, vol. 5, no. 1, pp. 752-757, 2016. [8] J. Chase dan M. Davis, β€œExtending the Hill Cipher,” 2010. [9] A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016. Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1151
  • 4. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5 Issue 7, July 2016 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Author Profile Andysah Putera Utama Siahaan was born in Medan, Indonesia, in 1980. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and the M.Kom. in computer science as well from the University of Sumatera Utara, Medan, Indonesia, in 2012. In 2010, he joined the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2012 became a junior researcher. He is applying for his Ph. D. degree in 2016. He has written in several international journal and conference. He is now active in writing papers and joining conferences. Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1152