AASEC 2019 Conference

Enhancement Three-Pass Protocol Security with Combination Caesar Cipher and Vigenere Cipher
Robbi Rahim(a)*, Mochammad Alfan Rosid(b), Arif Senja Fitrani(b), Achmad Daengs GS(c), Ni Luh Wiwik Sri Rahayu Ginantra(d)

a. School of Computer and Communication Engineering, Universiti Malaysia Perlis, Arau, Malaysia
b. Universitas Muhammadiyah Sidoarjo, Sidoarjo, Indonesia
c. Universitas 45 Surabaya, Indonesia
d. STMIK STIKOM Indonesia, Bali, Indonesia


Abstract

Key-based security is still the most widely used form of security today with a key distribution process between senders and receivers that is commonly perform and also it is a classic problem in cryptography where key must be share to other parties (sender or receiver) and its maybe known when third parties do sniffing process or man in the middle attack. Three-Pass Protocol is one solution that can be used to overcome the problem of key distribution, because the sender and receiver can encrypt and decrypt without need to exchange keys. Security in Three-Pass Protocol uses XOR logic so that the resulting ciphertext will be very easy to decrypt by those who are not responsible, to improve data security in the Three-Pass Protocol process which is use Caesar Cipher and Vigenere Cipher algorithms in the encryption and decryption process in the Pass Protocol scheme, and ciphertext encryption results are quite difficult to read and require a long time to decrypt them.

Keywords: Distribution Key, Security, Three-Pass Protocol, XOR Encryption

Topic: Computer Science

Link: https://ifory.id/abstract-plain/MBTpbjakX2q4

Web Format | Corresponding Author (Robbi Rahim)