Author:
Rahim R,Rosid M A,Fitrani A S,GS A Daengs,Ginantra N L W S R
Abstract
Abstract
Key-based security is still the most widely used form of security today with a key distribution process between senders and receivers that is commonly perform and also it is a classic problem in cryptography where key must be share to other parties (sender or receiver) and its maybe known when third parties do sniffing process or man in the middle attack. Three-Pass Protocol is one solution that can be used to overcome the problem of key distribution, because the sender and receiver can encrypt and decrypt without need to exchange keys. Security in Three-Pass Protocol uses XOR logic so that the resulting ciphertext will be very easy to decrypt by those who are not responsible, to improve data security in the Three-Pass Protocol process which is use Caesar Cipher and Vigenere Cipher algorithms in the encryption and decryption process in the Pass Protocol scheme, and ciphertext encryption results are quite difficult to read and require a long time to decrypt them.
Subject
General Physics and Astronomy