Three-Pass Protocol Concept in Hill Cipher Encryption Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper | Computer Science & Engineering | Indonesia | Volume 5 Issue 7, July 2016

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan

Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.

Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption

Edition: Volume 5 Issue 7, July 2016

Pages: 1149 - 1152

Share this Article

How to Cite this Article?

Andysah Putera Utama Siahaan, "Three-Pass Protocol Concept in Hill Cipher Encryption Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016437, Volume 5 Issue 7, July 2016, 1149 - 1152

Enter Your Registered Email Address





Similar Articles with Keyword 'Cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Hill Cipher'

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 7, July 2016

Pages: 1149 - 1152

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan

Share this Article

Downloads: 120 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this Article

Downloads: 137 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Downloads: 152 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 11, November 2015

Pages: 607 - 612

Classical Image Encryption and Decryption

Noor Dhia Kadhm Al-Shakarchy, Hiba Jabbar Al- Eqabie, Huda Fawzi Al- Shahad

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 101 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article



Top