Skip to main content

Attacking the Application of Three-Pass Protocol in Hill-Cipher

  • Conference paper
  • First Online:
Next Generation of Internet of Things

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 201))

  • 877 Accesses

Abstract

Hill-Cipher is one of the symmetric encryption algorithms that use one key for the encryption and decryption processes. This used key should be sent to the receiver in order to do the decryption process. However, to avoid sending the key to the receiver, three-pass protocol is applied. Three-pass protocol is a scheme to transmit data between the sender and receiver without having any advance distribution for the keys. In this study, a new attack on the encryption algorithm, three-pass protocol on Hill-Cipher, is introduced. This attack depends only on the ciphertext which makes us break this system by analyzing the encryption and decryption process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rahim R, Ikhwan A (2010) Study of three pass protocol on data security. Int J Sci Res (IJSR) 5(11):102–104

    Google Scholar 

  2. Gupta A, Walia NK (2014) Cryptography algorithms: a review. Int J Eng Dev Res (IJEDR) 2(2):1667–1672

    Google Scholar 

  3. Abdullah AA, Khalaf RZ, Habib HB (2019) Modified BB84 quantum key distribution protocol using legendre symbol. In: 2nd scientific conference of computer sciences (SCCS). University of Technology-Iraq, IEEE

    Google Scholar 

  4. Siahaan APU (2016) Three-pass protocol concept in Hill Cipher encryption technique. Int J Sci Res (IJSR) 5(7):1149–1152

    Article  Google Scholar 

  5. Toorani M, Falahati A (2009) A secure variant of the Hill Cipher. In: Symposium on computers and communications. IEEE

    Google Scholar 

  6. Abdullah AA, Khalaf R, Riza M (2015) A realizable quantum three-pass protocol authentication based on Hill-Cipher algorithm. Math Probl Eng 2015:6, Article ID 481824. https://doi.org/10.1155/2015/481824

  7. Rahman M, Nordin A, Abidin AFA, Yusof MK, Usop NSM (2013) Cryptography: a new approach of Classical Hill Cipher. Int J Secur Appl 7(2):179–190

    Google Scholar 

  8. Rosen KH (2011) Elementary number theory and its applications, 6th edn. Addison-Wesley, Pearson

    Google Scholar 

  9. Shibiraj N, Tomba I (2018) Modified Hill Cipher: secure technique using latin square and magic square. Int J Comput Sci Eng 6(12):315–320

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khalaf, R.Z., Habib, H.B., Aljaff, S.K. (2021). Attacking the Application of Three-Pass Protocol in Hill-Cipher. In: Kumar, R., Mishra, B.K., Pattnaik, P.K. (eds) Next Generation of Internet of Things. Lecture Notes in Networks and Systems, vol 201. Springer, Singapore. https://doi.org/10.1007/978-981-16-0666-3_12

Download citation

Publish with us

Policies and ethics