scispace - formally typeset
Open Access

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Reads0
Chats0
TLDR
The Three-Pass Protocol can be implemented to avoid the key interception and the information transmission is more secure than not using this concept.
Abstract
Encryption is imperative in the world of computers. Delivery of data requires a technique that the data is free from attack. Hill Cipher is the popular cryptography method. There are so many techniques that have been made to dismantle the message. Hill Cipher uses the symmetric key model. This key must be distributed to the recipients so that they can restore the ciphertext into plaintext. To avoid the key interception, the Three-Pass Protocol can be implemented to this situation. It avoids the key delivery. By using this technique, either the sender or the recipient does encryption and decryption by their keys respectively without sharing them with each other. It is impossible to the attacker to get the key since the both participants keep the keys safely. Hence, the information transmission is more secure than not using this concept.

read more

Citations
More filters
Journal ArticleDOI

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

TL;DR: This study modify the key on Vigenere Cipher, so when the key length smaller than the length of plaintext entered, the key will be generated by a process, so the next key character will be different from the previous key character.

Genetic Algorithm in Hill Cipher Encryption

TL;DR: Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher by determining the evaluation function in the genetic algorithm, and the key that fits the composition will be obtained.
Proceedings ArticleDOI

Super Encryption using Transposition-Hill Cipher for Digital Color Image

TL;DR: The proposed method is superior to the transposition method only, Hill cipher only and Hill cipher-transposition, and the combination of randomization and substitution techniques produces super encryption techniques that are more resistant to various attacks.

SMS Encryption Using One-Time Pad Cipher

TL;DR: The one-time pad method turns the plaintext into the ciphertext by doing XOR operation to every character and generates the new ASCII as the cipher character.
Proceedings ArticleDOI

Hill Cipher Modification: A Simplified Approach

TL;DR: A simplified method of encryption of data in blocks using the logical XOR and shift operations, and Radix64 for encoding and decoding the data is introduced and the results confirm that the security of the cipher improves to 53% avalanche effect percentage based on the actual experiment.
References
More filters
Journal Article

Cryptography: A New Approach of Classical Hill Cipher

TL;DR: A robust Hill algorithm (Hill++) is proposed which is an extension of the Affine Hill cipher and a random matrix key is introduced as an extra key for encryption and an involuntary matrix key formulation is also implemented in the proposed algorithm.
Journal ArticleDOI

A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm

TL;DR: A realizable quantum three-pass protocol authentication based on Hill- cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm.
Proceedings ArticleDOI

A triple hill cipher algorithm proposed to increase the security of encrypted binary data and its implementation using FPGA

TL;DR: This paper presents a proposed triple hill cipher algorithm and its implementation on FPGA to encrypt any binary data such as images, audio, video … etc and promises to give better security.
Journal ArticleDOI

A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation

TL;DR: A secured electronic message transaction system has been designed, developed and implemented where Hill Cipher Cryptosystem is used as the encryption-decryption process with dynamic keys.
Trending Questions (1)
Is signal more secure than Facetime?

Hence, the information transmission is more secure than not using this concept.