Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
العنوان: | Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification |
---|---|
المؤلفون: | Cut Lika Mestika Sandy, Amin Subandi, Rini Meiyanti, Rahmat Widia Sembiring |
المصدر: | Advances in Science, Technology and Engineering Systems, Vol 2, Iss 5, Pp 1-5 (2017) |
سنة النشر: | 2017 |
مصطلحات موضوعية: | FOS: Computer and information sciences, Computer Science - Cryptography and Security, Physics and Astronomy (miscellaneous), Computer science, Key distribution, Cryptography, 02 engineering and technology, Data_CODINGANDINFORMATIONTHEORY, Encryption, lcsh:Technology, 01 natural sciences, law.invention, Classic Cryptography Algorithm, law, Management of Technology and Innovation, 0202 electrical engineering, electronic engineering, information engineering, 0101 mathematics, lcsh:Science, Engineering (miscellaneous), Key size, lcsh:T, business.industry, 010102 general mathematics, 020206 networking & telecommunications, Plaintext, Symmetric-key algorithm, Vigenere Cipher, Three-Pass Protocol, Key (cryptography), lcsh:Q, business, Cryptanalysis, Cryptography and Security (cs.CR), Algorithm |
الوصف: | Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext length, it course allows cryptanalysts to make the process of cryptanalysis. And weaknesses of the symmetric key cryptographic algorithm is the safety of key distribution factor, if the key is known by others, then the function of cryptography itself become useless. Based on two such weaknesses, in this study, we modify the key on Vigenere Cipher, so when the key length smaller than the length of plaintext entered, the key will be generated by a process, so the next key character will be different from the previous key character. In This study also applied the technique of Three-pass protocol, a technique which message sender does not need to send the key, because each using its own key for the message encryption and decryption process, so the security of a message would be more difficult to solved. 2nd International Conference of Computer, Environment, Social Science, Health Science, Agriculture & Technology (ICEST) 2017 |
اللغة: | English |
URL الوصول: | https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7f91c28b802d96bd0d891b2d732cad6a http://arxiv.org/abs/1707.01609 |
Rights: | OPEN |
رقم الانضمام: | edsair.doi.dedup.....7f91c28b802d96bd0d891b2d732cad6a |
قاعدة البيانات: | OpenAIRE |
الوصف غير متاح. |