Three-pass protocol implementation in hill cipher encryption technique
Other Title(s)
تنفيذ بروتوكول المعابر الثلاثة في تقنية تشفير هيل
Author
Source
مجلة جامعة سبها للعلوم البحتة و التطبيقية
Publisher
Publication Date
2019-12-31
Country of Publication
Libya
No. of Pages
6
Main Subjects
Information Technology and Computer Science
English Abstract
Hill Cipher is a common encryption technique that relies on Algebra of matrices in the selecting of the encryption key, which is expected to complicate the various techniques of crypt-analyst.
But it has a disadvantage which exchange the keys between recipients, the receiver can't decrypt cipher text until the sender send to the receiver the key used to encryption the data.
So that, he can restore the cipher text into plain text.
Therefore, the message will be subjected to the exposing plain text and decrypt the cipher text.
Three-Pass Protocol is protocol that allows both senders and receivers to communicate without the key exchange.The main goal in the research is to strengthen the security of the data, used in combination Hill Cipher algorithm for encryption and decryption while Three-Pass Protocol used to send process.The technique of Three-Pass Protocol is applied in the Hill Cipher and the results have been analyzed.The result of the analysis indicated that the encryption has been enhanced and the security improved by 85% in comparison with conventional Hill.
Data Type
Conference Papers
Record ID
BIM-1201354
American Psychological Association (APA)
al-Sharif, Salwa Miftah. 2019-12-31. Three-pass protocol implementation in hill cipher encryption technique. . Vol. 18, no. 4 (2019), pp.237-242.Sabha Murzuq : Sabha University.
https://search.emarefa.net/detail/BIM-1201354
Modern Language Association (MLA)
al-Sharif, Salwa Miftah. Three-pass protocol implementation in hill cipher encryption technique. . Sabha Murzuq : Sabha University. 2019-12-31.
https://search.emarefa.net/detail/BIM-1201354
American Medical Association (AMA)
al-Sharif, Salwa Miftah. Three-pass protocol implementation in hill cipher encryption technique. .
https://search.emarefa.net/detail/BIM-1201354