International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Research Paper | Computer Science & Engineering | Indonesia | Volume 5 Issue 7, July 2016


Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan


Abstract: Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.


Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption


Edition: Volume 5 Issue 7, July 2016,


Pages: 1149 - 1152


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Andysah Putera Utama Siahaan, "Three-Pass Protocol Concept in Hill Cipher Encryption Technique", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 1149-1152, https://www.ijsr.net/get_abstract.php?paper_id=ART2016437

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [12] | R. Sathya [8]

Share this Article
Top