iipp publishingJournal of Applied Engineering Science


DOI: 10.5937/jaes16-16557
This is an open access article distributed under the CC BY-NC-ND 4.0 terms and conditions. 
Creative Commons License

Volume 16 article 549 pages: 424 - 429

Robbi Rahim
University Malaysia, School of Computer and Communication Engineering, Perlis, Malaysia

Three-pass Protocol is a method or technique that can be used by 2 (two) sender and recipient of the message to communicate with each other using XOR function, the problem that occurs is when the communication process there is parties who can know the messages sent from the sender to the recipient. To solve the problem we need an al­gorithm in this case Pohlig-Hellman algorithm, the use of Pohlig-Hellman algorithm on Three-pass Protocol ensures the security of messages sent by the sender to the receiver because each sender and receiver uses keys p, e, and d which is a number random and d is the inverse modulo of p and e of the sender and receiver, the results of this research suggest that it is impossible for the attacker or cryptanalyst to know the correct message quickly despite having adequate computer resources.

View article

Abdalla, M., & Pointcheval, D. (2005). Simple Pass­word-Based Encrypted Key Exchange Protocols. Lectures Notes in Computer Science, 3376, 191– 208. https://doi.org/10.1007/978-3-540-30574-3_14

Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A Secure Vi­sual Cryptography Scheme Using Private Key with Invariant Share Sizes. Journal of Software Engi­neering and Applications, 10(01), 1–10. https://doi. org/10.4236/jsea.2017.101001

Alam, M. I., & Khan, M. R. (2013). Performance and Efficiency Analysis of Different Block Cipher Algo­rithms of Symmetric Key Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 2277–128.

Blumenthal, M. (2007). Encryption: Strengths and Weaknesses of Public-key Cryptography. CSRS 2007, 1–7. https://doi.org/PA 19085 CSC 3990 – Computing Research Topics

Bruce, S. (1996). Applied cryptography. John Wiley & Sons. https://doi.org/10.1017/ CBO9781107415324.004

Guo, M., Bhattacharya, P., Yang, M., Qian, K., & Yang, L. (2013). Learning mobile security with an­droid security labware. In Proceeding of the 44th ACM technical symposium on Computer sci­ence education - SIGCSE ’13 (p. 675). https://doi. org/10.1145/2445196.2445394

Hoffstein, J., Pipher, J., & Silverman, J. H. (2014). Diffie–Hellman key exchange. An Introduction to Mathematical Cryptography, 65–67. Retrieved from http://www.math.brown.edu/~jhs/MathCrypto/Sam­pleSections.pdf

Li, N. (2010). Research on diffie-hellman key ex­change protocol. In ICCET 2010 - 2010 International Conference on Computer Engineering and Technol­ogy, Proceedings (Vol. 4). https://doi.org/10.1109/ ICCET.2010.5485276

Mesran, M., Abdullah, D., Hartama, D., Roslina, R., Asri, A., Rahim, R., & Ahmar, A. S. (2018). Com­bination Base64 and Hashing Variable Length for Securing Data. Journal of Physics: Conference Se­ries, 1028, 012056. https://doi.org/10.1088/1742- 6596/1028/1/012056

Nurdiyanto, H., & Rahim, R. (2017). Enhanced pixel value differencing steganography with government standard algorithm. In 2017 3rd International Con­ference on Science in Information Technology (ICSI­Tech) (pp. 366–371). IEEE. https://doi.org/10.1109/ ICSITech.2017.8257140

Nurdiyanto, H., Rahim, R., & Wulan, N. (2017). Symmetric Stream Cipher using Triple Transposi­tion Key Method and Base64 Algorithm for Security Improvement. Journal of Physics: Conference Se­ries, 930(1), 012005. https://doi.org/10.1088/1742- 6596/930/1/012005

Putera, A., Siahaan, U., & Rahim, R. (2016). Dy­namic Key Matrix of Hill Cipher Using Genetic Algo­rithm. International Journal of Security and Its Ap­plications, 10(8), 173–180. https://doi.org/10.14257/ ijsia.2016.10.8.15

Rahim, R. (2017). Man-in-the-middle-attack preven­tion using interlock protocol method. ARPN Journal of Engineering and Applied Sciences, 12(22), 6483– 6487.

Rahim, R., Dahria, M., Syahril, M., & Anwar, B. (2017). Combination of the Blowfish and Lempel- Ziv-Welch algorithms for text compression. World Transactions on Engineering and Technology Edu­cation, 15(3), 292–297.

Rahim, R., & Ikhwan, A. (2016a). Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher. International Journal of Scien­tific Research in Science and Technology (IJSRST), 2(6), 71–78.

Rahim, R., & Ikhwan, A. (2016b). Study of Three Pass Protocol on Data Security. International Journal of Science and Research, 5(11), 102–104. https:// doi.org/10.21275/ART20162670

Rahim, R., Winata, H., Zulkarnain, I., & Jaya, H. (2017). Prime Number: an Experiment Rabin-Mill­er and Fast Exponentiation. Journal of Physics: Conference Series, 930(1), 012032. https://doi. org/10.1088/1742-6596/930/1/012032

Schneier, B. (1996). Applied Cryptography: Proto­cols, Algorithms, and Source Code in C, Second Edition. Network. https://doi.org/10.1016/S0740- 624X(96)90083-0

Sklavos, N., Papadomanolakis, K., Kitsos, P., & Kou­fopavlou, O. (2002). Euclidean algorithm VLSI imple­mentations. In Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems (Vol. 2, pp. 557–560). https://doi.org/10.1109/ ICECS.2002.1046226

Sriadhi, S., Rahim, R., & Ahmar, A. S. (2018). RC4 Algorithm Visualization for Cryptography Ed­ucation. Journal of Physics: Conference Series, 1028(1), 012057. https://doi.org/10.1088/1742- 6596/1028/1/012057

Uchoa, A. G. D., Pellenz, M. E., Santin, A. O., & Ma­ziero, C. A. (2007). A Three-Pass Protocol for Cryp­tography Based on Padding for Wireless Networks. In 2007 4th IEEE Consumer Communications and Networking Conference (pp. 287–291). IEEE. https:// doi.org/10.1109/CCNC.2007.63

Yang, L., Wu, L.-A., & Liu, S. (2002). A quantum three-pass cryptography protocol. In Proceedings of SPIE - The International Society for Optical En­gineering (Vol. 4917, pp. 106–111). https://doi. org/10.1117/12.483035