Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key method is the key used for encryption is the same as the key used for the decryption process. Three-Pass Protocol is one of the modern cryptography where the process of sending a message does not need to distribute the key so that each party both the recipient and sender of the message does not need to know each lock. In this combination of receiving and sending messages using the Caesar Cipher algorithm for encryptionand decryption, while for its delivery process using algorithms Three Pass protocol. The results from the combination of the two algorithms are to help the information sent is secure.
Authors and Affiliations
Boni Oktaviana , Andysah Putera Utama Siahaan
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Based Technique
Online Social Networks (OSNs) are today one of the most popular interactive medium to share, communicate, and distribute a significant amount of human life information. In OSNs, information filtering can a...
Study on Face Recognition Algorithm
Biometrics authentication is started to be used worldwide since the security it provides is of greaterextends. Face recognition is an important method of such an authentication. Face recognition can be carried out by man...
Twin Key Implementation in Aes
Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Regis...
An efficient process mining model for Petri Nets in process discovery
Abstract: Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining...
Efficient IOT Based Sensor Data Analysis in Wireless SensorNetworks with Cloud
Abstract: The improvement of wireless sensor network has offered move to public sensing as it is vibrantsharing model. This creative energy can be clarified under the Internet of Things (IoT) to adopt differentinformatio...