Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers

Authors(2) :-Ranti Eka Putri, Andysah Putera Utama Siahaan

Classical cryptographic algorithms are algorithms that can help users to process encryption and decryption efficiently. Because it is easy, this algorithm is often hacked by wild parties. This algorithm has the power that is vulnerable to attacks on keys. The key used can be hijacked, and finally, the ciphertext can be solved. The plaintext can eventually be found because the key has been taken. The combination of two classical algorithms using the Three-pass Protocol scheme is beneficial because the information sent is stronger because this process does not distribute the key to the recipient of the information. Each actor will do encryption and decryption with their keys. The key will not be exchanged, and the key does not need to be known by the sender and recipient. This scheme is very safe to use because there are no key shipments through the global network. The Three-pass Protocol concept creates a power that is far better than the usual classical cryptographic process.

Authors and Affiliations

Ranti Eka Putri
Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia
Andysah Putera Utama Siahaan
Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia

Three-Pass Protocol, Gronsfeld, Vigenere, Encryption, Decryption, Algorithm

  1. Hariyanto dan A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 115-121, 2016.
  2. Ming dan S. LiZhong, "A New System Design of Network Invasion Forensics," in 2009 Second International Conference on Computer and Electrical Engineering, 2009, hal. 596-599.
  3. Azzuhry, "Manfaat Kriptografi dalam Kehidupan," UGM, 2012. Daring]. Tersedia pada: http://fattah-azzuhry.blog.ugm.ac.id/2012/02/23/manfaat-kriptografi-dalam-kehidupan/.
  4. Tasril, M. B. Ginting, Mardiana, dan A. P. U. Siahaan, "Threats of Computer System and its Prevention," Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, hal. 448-451, 2017.
  5. U. Siahaan, "Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm," Int. J. Adv. Appl. Sci., vol. 6, no. 4, hal. 313-318, 2017.
  6. U. Siahaan, "Genetic Algorithm in Hill Cipher Encryption," Am. Int. J. Res. Sci. Technol. Eng. Math., vol. 15, no. 1, hal. 84-89, 2016.
  7. Sumartono, A. P. U. Siahaan, dan N. Mayasari, "An Overview of the RC4 Algorithm," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 67-73, 2016.
  8. Sumartono, A. P. U. Siahaan, dan Arpan, "Base64 Character Encoding and Decoding Modeling," Int. J. Recent Trends Eng. Res., vol. 2, no. 12, hal. 63-68, 2016.
  9. Lubis dan A. P. U. Siahaan, "Network Forensic Application in General Cases," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 41-44, 2016.
  10. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Prentice Hall Press, 2013.
  11. Abror, "Pengertian dan Aspek-Aspek Keamanan Komputer," 2018. Daring]. Tersedia pada: https://www.ayoksinau.com/pengertian-dan-aspek-aspek-keamanan-komputer-lengkap/. Diakses: 01-Okt-2018].
  12. Paul, P. Mythili, dan K. Paulose Jacob, "Matrix based cryptographic procedure for efficient image encryption," in 2011 IEEE Recent Advances in Intelligent Computational Systems, 2011, hal. 173-177.
  13. A. Buchmann, Introduction to Cryptography, 1st ed. Berlin: Springer-Verlag, 2000.
  14. Mesran, "Gronsfeld Cipher," Wordpress, 2011. Daring]. Tersedia pada: https://mesran.wordpress.com/2011/07/03/gronsfeld-cipher/. Diakses: 01-Okt-2018].
  15. Apriadi, "Kriptografi Kunci Simetris Gronsfeld Chiper," Blogspot, 2016. Daring]. Tersedia pada: https://dodi-apriadi.blogspot.com/2016/02/kriptografi-kunci-simetris-gronsfeld.html. Diakses: 01-Okt-2018].
  16. M. Pratama dan E. N. Tamatjita, "MODIFIKASI ALGORITMA VIGENERE CIPHER MENGGUNAKAN METODE CATALAN NUMBER DAN DOUBLE COLUMNAR TRANSPOSITION," Compiler, vol. 4, no. 1, hal. 31-40, 2015.

Publication Details

Published in : Volume 4 | Issue 10 | September-October 2018
Date of Publication : 2018-10-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 223-228
Manuscript Number : IJSRST1841059
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Ranti Eka Putri, Andysah Putera Utama Siahaan, " Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers, International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 10, pp.223-228, September-October-2018. Available at doi : 10.32628/IJSRST1841059
Journal URL : http://ijsrst.com/IJSRST1841059

Article Preview

Contact Us