International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 114

Research Paper | Computer Science & Engineering | Indonesia | Volume 5 Issue 7, July 2016


Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan


Abstract: Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.


Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption


Edition: Volume 5 Issue 7, July 2016,


Pages: 1149 - 1152


How to Cite this Article?

Andysah Putera Utama Siahaan, "Three-Pass Protocol Concept in Hill Cipher Encryption Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART2016437, Volume 5 Issue 7, July 2016, 1149 - 1152

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Hill Cipher'

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this Article

Downloads: 137

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top