Open Access
Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher
Author(s) -
Robbi Rahim,
Mochamad Alfan Rosid,
Arif Senja Fitrani,
Achmad Daengs GS,
Ni Luh Wiwik Sri Rahayu Ginantra
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1402/6/066045
Subject(s) - computer science , ciphertext , encryption , computer security , cipher , computer network , theoretical computer science
Key-based security is still the most widely used form of security today with a key distribution process between senders and receivers that is commonly perform and also it is a classic problem in cryptography where key must be share to other parties (sender or receiver) and its maybe known when third parties do sniffing process or man in the middle attack. Three-Pass Protocol is one solution that can be used to overcome the problem of key distribution, because the sender and receiver can encrypt and decrypt without need to exchange keys. Security in Three-Pass Protocol uses XOR logic so that the resulting ciphertext will be very easy to decrypt by those who are not responsible, to improve data security in the Three-Pass Protocol process which is use Caesar Cipher and Vigenere Cipher algorithms in the encryption and decryption process in the Pass Protocol scheme, and ciphertext encryption results are quite difficult to read and require a long time to decrypt them.