Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers

Authors

  • Ranti Eka Putri  Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia
  • Andysah Putera Utama Siahaan  Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia

Keywords:

Three-Pass Protocol, Gronsfeld, Vigenere, Encryption, Decryption, Algorithm

Abstract

Classical cryptographic algorithms are algorithms that can help users to process encryption and decryption efficiently. Because it is easy, this algorithm is often hacked by wild parties. This algorithm has the power that is vulnerable to attacks on keys. The key used can be hijacked, and finally, the ciphertext can be solved. The plaintext can eventually be found because the key has been taken. The combination of two classical algorithms using the Three-pass Protocol scheme is beneficial because the information sent is stronger because this process does not distribute the key to the recipient of the information. Each actor will do encryption and decryption with their keys. The key will not be exchanged, and the key does not need to be known by the sender and recipient. This scheme is very safe to use because there are no key shipments through the global network. The Three-pass Protocol concept creates a power that is far better than the usual classical cryptographic process.

References

  1. Hariyanto dan A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 115-121, 2016.
  2. Ming dan S. LiZhong, "A New System Design of Network Invasion Forensics," in 2009 Second International Conference on Computer and Electrical Engineering, 2009, hal. 596-599.
  3. Azzuhry, "Manfaat Kriptografi dalam Kehidupan," UGM, 2012. Daring]. Tersedia pada: http://fattah-azzuhry.blog.ugm.ac.id/2012/02/23/manfaat-kriptografi-dalam-kehidupan/.
  4. Tasril, M. B. Ginting, Mardiana, dan A. P. U. Siahaan, "Threats of Computer System and its Prevention," Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, hal. 448-451, 2017.
  5. U. Siahaan, "Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm," Int. J. Adv. Appl. Sci., vol. 6, no. 4, hal. 313-318, 2017.
  6. U. Siahaan, "Genetic Algorithm in Hill Cipher Encryption," Am. Int. J. Res. Sci. Technol. Eng. Math., vol. 15, no. 1, hal. 84-89, 2016.
  7. Sumartono, A. P. U. Siahaan, dan N. Mayasari, "An Overview of the RC4 Algorithm," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 67-73, 2016.
  8. Sumartono, A. P. U. Siahaan, dan Arpan, "Base64 Character Encoding and Decoding Modeling," Int. J. Recent Trends Eng. Res., vol. 2, no. 12, hal. 63-68, 2016.
  9. Lubis dan A. P. U. Siahaan, "Network Forensic Application in General Cases," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 41-44, 2016.
  10. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Prentice Hall Press, 2013.
  11. Abror, "Pengertian dan Aspek-Aspek Keamanan Komputer," 2018. Daring]. Tersedia pada: https://www.ayoksinau.com/pengertian-dan-aspek-aspek-keamanan-komputer-lengkap/. Diakses: 01-Okt-2018].
  12. Paul, P. Mythili, dan K. Paulose Jacob, "Matrix based cryptographic procedure for efficient image encryption," in 2011 IEEE Recent Advances in Intelligent Computational Systems, 2011, hal. 173-177.
  13. A. Buchmann, Introduction to Cryptography, 1st ed. Berlin: Springer-Verlag, 2000.
  14. Mesran, "Gronsfeld Cipher," Wordpress, 2011. Daring]. Tersedia pada: https://mesran.wordpress.com/2011/07/03/gronsfeld-cipher/. Diakses: 01-Okt-2018].
  15. Apriadi, "Kriptografi Kunci Simetris Gronsfeld Chiper," Blogspot, 2016. Daring]. Tersedia pada: https://dodi-apriadi.blogspot.com/2016/02/kriptografi-kunci-simetris-gronsfeld.html. Diakses: 01-Okt-2018].
  16. M. Pratama dan E. N. Tamatjita, "MODIFIKASI ALGORITMA VIGENERE CIPHER MENGGUNAKAN METODE CATALAN NUMBER DAN DOUBLE COLUMNAR TRANSPOSITION," Compiler, vol. 4, no. 1, hal. 31-40, 2015.

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
Ranti Eka Putri, Andysah Putera Utama Siahaan, " Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 10, pp.223-228, September-October-2018.