DOI: 10.5937/jaes16-16557
This is an open access article distributed under the CC BY-NC-ND 4.0 terms and conditions.
Volume 16 article 549 pages: 424 - 429
Three-pass
Protocol is a method or technique that can be used by 2 (two) sender and
recipient of the message to communicate with each other using XOR function, the
problem that occurs is when the communication process there is parties who can
know the messages sent from the sender to the recipient. To solve the problem
we need an algorithm in this case Pohlig-Hellman algorithm, the use of
Pohlig-Hellman algorithm on Three-pass Protocol ensures the security of
messages sent by the sender to the receiver because each sender and receiver
uses keys p, e, and d which is a number random and d is the inverse modulo of p
and e of the sender and receiver, the results of this research suggest that it
is impossible for the attacker or cryptanalyst to know the correct message
quickly despite having adequate computer resources.
Abdalla, M., &
Pointcheval, D. (2005). Simple Password-Based Encrypted Key Exchange
Protocols. Lectures Notes in Computer Science, 3376, 191– 208.
https://doi.org/10.1007/978-3-540-30574-3_14
Al-Khalid, R. I.,
Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A
Secure Visual Cryptography Scheme Using Private Key with Invariant Share
Sizes. Journal of Software Engineering and Applications, 10(01), 1–10.
https://doi. org/10.4236/jsea.2017.101001
Alam, M. I., &
Khan, M. R. (2013). Performance and Efficiency Analysis of Different Block
Cipher Algorithms of Symmetric Key Cryptography. International Journal of
Advanced Research in Computer Science and Software Engineering, 3(10),
2277–128.
Blumenthal, M.
(2007). Encryption: Strengths and Weaknesses of Public-key Cryptography. CSRS
2007, 1–7. https://doi.org/PA 19085 CSC 3990 – Computing Research Topics
Bruce, S. (1996).
Applied cryptography. John Wiley & Sons. https://doi.org/10.1017/
CBO9781107415324.004
Guo, M.,
Bhattacharya, P., Yang, M., Qian, K., & Yang, L. (2013). Learning mobile
security with android security labware. In Proceeding of the 44th ACM
technical symposium on Computer science education - SIGCSE ’13 (p. 675).
https://doi. org/10.1145/2445196.2445394
Hoffstein, J.,
Pipher, J., & Silverman, J. H. (2014). Diffie–Hellman key exchange. An
Introduction to Mathematical Cryptography, 65–67. Retrieved from
http://www.math.brown.edu/~jhs/MathCrypto/SampleSections.pdf
Li, N. (2010).
Research on diffie-hellman key exchange protocol. In ICCET 2010 - 2010
International Conference on Computer Engineering and Technology, Proceedings
(Vol. 4). https://doi.org/10.1109/ ICCET.2010.5485276
Mesran, M.,
Abdullah, D., Hartama, D., Roslina, R., Asri, A., Rahim, R., & Ahmar, A. S.
(2018). Combination Base64 and Hashing Variable Length for Securing Data.
Journal of Physics: Conference Series, 1028, 012056.
https://doi.org/10.1088/1742- 6596/1028/1/012056
Nurdiyanto, H.,
& Rahim, R. (2017). Enhanced pixel value differencing steganography with
government standard algorithm. In 2017 3rd International Conference on Science
in Information Technology (ICSITech) (pp. 366–371). IEEE.
https://doi.org/10.1109/ ICSITech.2017.8257140
Nurdiyanto, H.,
Rahim, R., & Wulan, N. (2017). Symmetric Stream Cipher using Triple
Transposition Key Method and Base64 Algorithm for Security Improvement.
Journal of Physics: Conference Series, 930(1), 012005.
https://doi.org/10.1088/1742- 6596/930/1/012005
Putera, A., Siahaan,
U., & Rahim, R. (2016). Dynamic Key Matrix of Hill Cipher Using Genetic
Algorithm. International Journal of Security and Its Applications, 10(8),
173–180. https://doi.org/10.14257/ ijsia.2016.10.8.15
Rahim, R. (2017).
Man-in-the-middle-attack prevention using interlock protocol method. ARPN
Journal of Engineering and Applied Sciences, 12(22), 6483– 6487.
Rahim, R., Dahria,
M., Syahril, M., & Anwar, B. (2017). Combination of the Blowfish and
Lempel- Ziv-Welch algorithms for text compression. World Transactions on
Engineering and Technology Education, 15(3), 292–297.
Rahim, R., &
Ikhwan, A. (2016a). Cryptography Technique with Modular Multiplication Block
Cipher and Playfair Cipher. International Journal of Scientific Research in
Science and Technology (IJSRST), 2(6), 71–78.
Rahim, R., &
Ikhwan, A. (2016b). Study of Three Pass Protocol on Data Security. International
Journal of Science and Research, 5(11), 102–104. https://
doi.org/10.21275/ART20162670
Rahim, R., Winata,
H., Zulkarnain, I., & Jaya, H. (2017). Prime Number: an Experiment
Rabin-Miller and Fast Exponentiation. Journal of Physics: Conference Series,
930(1), 012032. https://doi. org/10.1088/1742-6596/930/1/012032
Schneier, B. (1996).
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second
Edition. Network. https://doi.org/10.1016/S0740- 624X(96)90083-0
Sklavos, N.,
Papadomanolakis, K., Kitsos, P., & Koufopavlou, O. (2002). Euclidean
algorithm VLSI implementations. In Proceedings of the IEEE International
Conference on Electronics, Circuits, and Systems (Vol. 2, pp. 557–560).
https://doi.org/10.1109/ ICECS.2002.1046226
Sriadhi, S., Rahim,
R., & Ahmar, A. S. (2018). RC4 Algorithm Visualization for Cryptography Education.
Journal of Physics: Conference Series, 1028(1), 012057.
https://doi.org/10.1088/1742- 6596/1028/1/012057
Uchoa, A. G. D.,
Pellenz, M. E., Santin, A. O., & Maziero, C. A. (2007). A Three-Pass
Protocol for Cryptography Based on Padding for Wireless Networks. In 2007 4th
IEEE Consumer Communications and Networking Conference (pp. 287–291). IEEE.
https:// doi.org/10.1109/CCNC.2007.63
Yang, L., Wu, L.-A.,
& Liu, S. (2002). A quantum three-pass cryptography protocol. In
Proceedings of SPIE - The International Society for Optical Engineering (Vol.
4917, pp. 106–111). https://doi. org/10.1117/12.483035