International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 140

Indonesia | Computer Science Engineering | Volume 5 Issue 11, November 2016 | Pages: 102 - 104


Study of Three Pass Protocol on Data Security

Robbi Rahim, Ali Ikhwan

Abstract: Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of symmetric and asymmetric which has advantages and disadvantages of each, one of the problems that arise in cryptography type of symmetric is the key distribution should be given sender to the receiver's tackle the key distribution process used a cryptographic protocol three pass protocol has a way of working in which the sender and receiver do not need to exchange keys

Keywords: Cryptography, Symetric And Asymmetric, Protocol Cryptography, Three Pass Protocol



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top